What we learn from learning - Understanding capabilities and limitations of machine learning in botnet attacks

05/03/2018
by   David Santana, et al.
0

With a growing increase in botnet attacks, computer networks are constantly under threat from attacks that cripple cyber-infrastructure. Detecting these attacks in real-time proves to be a difficult and resource intensive task. One of the pertinent methods to detect such attacks is signature based detection using machine learning models. This paper explores the efficacy of these models at detecting botnet attacks, using data captured from large-scale network attacks. Our study provides a comprehensive overview of performance characteristics two machine learning models --- Random Forest and Multi-Layer Perceptron (Deep Learning) in such attack scenarios. Using Big Data analytics, the study explores the advantages, limitations, model/feature parameters, and overall performance of using machine learning in botnet attacks / communication. With insights gained from the analysis, this work recommends algorithms/models for specific attacks of botnets instead of a generalized model.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/10/2019

SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach

This paper presents the development of a Supervisory Control and Data Ac...
research
01/12/2022

Predicting Terrorist Attacks in the United States using Localized News Data

Terrorism is a major problem worldwide, causing thousands of fatalities ...
research
10/19/2018

Using Machine Learning to reduce the energy wasted in Volunteer Computing Environments

High Throughput Computing (HTC) provides a convenient mechanism for runn...
research
08/30/2023

Predict And Prevent DDOS Attacks Using Machine Learning and Statistical Algorithms

A malicious attempt to exhaust a victim's resources to cause it to crash...
research
01/06/2021

Phishing Attacks and Websites Classification Using Machine Learning and Multiple Datasets (A Comparative Analysis)

Phishing attacks are the most common type of cyber-attacks used to obtai...
research
04/22/2016

Detecting state of aggression in sentences using CNN

In this article we study verbal expression of aggression and its detecti...
research
04/23/2018

Data-Driven Investigative Journalism For Connectas Dataset

The following paper explores the possibility of using Machine Learning a...

Please sign up or login with your details

Forgot password? Click here to reset