PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet

نویسندگان

چکیده

Due to emerging internet technologies that mostly depend on the decentralization concept, such as cryptocurrencies, cyber attackers also use concept develop P2P botnets. botnets are considered one of most serious and challenging threats infrastructure security. Consequently, several open issues still need be addressed, improving botnet intrusion detection systems, because is essentially a confrontational problem. This paper presents PeerAmbush, novel approach for detecting using, first time, effective deep learning techniques, which Multi-Layer Perceptron, with certain parameter settings detect this type botnet, unlike current research, entirely based machine techniques. The reason employing learning/deep besides data analysis, bots under same have symmetrical behavior, makes them recognizable compared benign network traffic. PeerAmbush takes challenge fewer selected features existing related works by proposing feature engineering method Best First Union (BFU). proposed showed considerable results, very high accuracy 99.9%, no FPR. experimental results promising approach, we look forward building it better security defenses.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Peer to Peer Botnet Detection System

-In this upcoming highly engaged traffic calls in the Peer to Peer (P2P) botnets the high scalability of detection systems is going down. Where the botmasters adopt modern system to detect traffic which ends in the malicious activities and poor scalability. So in this paper, we proposed a highly scalable botnet detection system for a stealthy peer to peer botnets. In this p2p detection it will ...

متن کامل

Mining Concept-Drifting Data Stream to Detect Peer to Peer Botnet Traffic

We propose a novel stream data classification technique to detect Peer to Peer botnet. Botnet traffic can be considered as stream data having two important properties: infinite length and drifting concept. Thus, stream data classification technique is more appealing to botnet detection than simple classification technique. However, no other botnet detection approaches so far have applied stream...

متن کامل

شناسایی مبتنی بر میزبان کرم واره ها در شبکه های peer-to-peer

کرم واره ها (کرم های کامپیوتری)، به علت قابلیت انتشار مستقل و اثرات مخربی که می توانند بر جای بگذارند، یکی از بزرگترین تهدیدات شبکه محسوب می گردند. روش های تشخیص کرم واره باید از سرعت بالایی برخوردار بوده، نرخ خطای پایینی داشته و قابلیت تشخیص کرم واره ها ی جدید را نیز داشته باشند. شبکه های جدیدی مانند شبکه peer-to-peer (p2p)باعث به وجود آمدن زمینه جدیدی برای فعالیت کرم واره ها شده اند. کرم واره...

15 صفحه اول

Peer-to-Peer Botnet Detection Using NetFlow Master Thesis

. Abstract . . Traditional botnets use a centralized communications architecture where all the bots connect to Command and Control (C&C) servers. These servers are the weak point of the botnet, as they are easy targets for take down and monitoring. Peer-to-peer (p2p) botnets have a distributed architecture, which make them more resilient. This research aims at the detection of individual p2p bo...

متن کامل

Peer-to-Peer Botnets: The Next Generation of Botnet Attacks

“Botnet” is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today’s Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without C&C servers, P2P botnets are more resilient to defense...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2022

ISSN: ['0865-4824', '2226-1877']

DOI: https://doi.org/10.3390/sym14122483