...
首页> 外文期刊>International Journal of Network Management >Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?
【24h】

Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?

机译:僵尸网络行为分析:具有最少先验信息的基于数据分析的系统将如何执行?

获取原文
获取原文并翻译 | 示例

摘要

Botnets, as one of the most aggressive threats, has used different techniques, topologies, and communication protocols in different stages of their lifecycle since 2003. Hence, identifying botnets has become very challenging specifically given that they can upgrade their methodology at any time. Various detection approaches have been proposed by the cyber-security researchers, focusing on different aspects of these threats. In this work, 5 different botnet detection approaches are investigated. These systems are selected based on the technique used and type of data used where 2 are public rule-based systems (BotHunter and Snort) and the other 3 use machine learning algorithm with different feature extraction methods (packet payload based and traffic flow based). On the other hand, 4 of these systems are based on a priori knowledge while one is using minimum a priori information. The objective in this analysis is to evaluate the effectiveness of these approaches under different scenarios (eg, multi-botnet and single-botnet classifications) as well as exploring how a system with minimum a priori information would perform. The goal is to investigate if a system with minimum a priori information could result in a competitive performance compared to systems using a priori knowledge. The evaluation is shown on 24 publicly available botnet data sets. Results indicate that a machine learning-based system with minimum a priori information not only achieves a very high performance but also generalizes much better than the other systems evaluated on a wide range of botnet structures (from centralized to decentralized botnets).
机译:自2003年以来,僵尸网络已成为最激进的威胁之一,在其生命周期的不同阶段使用了不同的技术,拓扑和通信协议。因此,要确定僵尸网络可以随时升级其方法论,就变得非常具有挑战性。网络安全研究人员已经提出了各种检测方法,重点放在这些威胁的不同方面。在这项工作中,研究了5种不同的僵尸网络检测方法。这些系统是根据使用的技术和使用的数据类型选择的,其中2个是基于公共规则的系统(BotHunter和Snort),其他3个使用具有不同特征提取方法的机器学习算法(基于数据包有效负载和基于业务流)。另一方面,这些系统中有4个基于先验知识,而一个系统使用的是最少的先验信息。该分析的目的是评估这些方法在不同场景(例如,多僵尸网络和单僵尸网络分类)下的有效性,并探索具有最少先验信息的系统将如何执行。目标是研究与使用先验知识的系统相比,具有最少先验信息的系统是否可以带来竞争优势。评估显示在24个公开可用的僵尸网络数据集上。结果表明,基于机器学习的具有最少先验信息的系统不仅可以实现非常高的性能,而且比在广泛的僵尸网络结构(从集中式僵尸网络到分散式僵尸网络)上评估的其他系统具有更高的泛化能力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号