Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection
As computer and network technologies evolve, the complexity of cybersecurity has dramatically increased. Advanced cyber threats have led to current approaches to cyber-attack detection becoming ineffective. Many currently used computer systems and applications have never been deeply tested from a cy...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2017-01, Vol.2017 (2017), p.1-10 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10 |
---|---|
container_issue | 2017 |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2017 |
creator | Kozik, Rafał Choraś, Michał |
description | As computer and network technologies evolve, the complexity of cybersecurity has dramatically increased. Advanced cyber threats have led to current approaches to cyber-attack detection becoming ineffective. Many currently used computer systems and applications have never been deeply tested from a cybersecurity point of view and are an easy target for cyber criminals. The paradigm of security by design is still more of a wish than a reality, especially in the context of constantly evolving systems. On the other hand, protection technologies have also improved. Recently, Big Data technologies have given network administrators a wide spectrum of tools to combat cyber threats. In this paper, we present an innovative system for network traffic analysis and anomalies detection to utilise these tools. The systems architecture is based on a Big Data processing framework, data mining, and innovative machine learning techniques. So far, the proposed system implements pattern extraction strategies that leverage batch processing methods. As a use case we consider the problem of botnet detection by means of data in the form of NetFlows. Results are promising and show that the proposed system can be a useful tool to improve cybersecurity. |
doi_str_mv | 10.1155/2017/6047053 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455788645</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455788645</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-ae5d28f8231a1a36506256463a31a8eef87bf45fe0fd03661babb2db179df7663</originalsourceid><addsrcrecordid>eNqF0E1PAjEQBuDGaCKiN8-miUdd7XeXIyD4EaIe9Nx02aksgS22RfTfu7hEj55mMnlmJnkROqXkilIprxmh-loRoYnke6hDe7yXEcrY_m9PxSE6inFOiKJCiw56eLYpQajx6DMFO02Vr3F_8eZDlWZL7HzAj5DGC7_JBjZCiQc-1ZBwv5EfVaog4htI8LN3jA6cXUQ42dUueh2PXoZ32eTp9n7Yn2RTrkjKLMiS5S5nnFpquZJEMamE4rYZ5AAu14UT0gFxJeFK0cIWBSsLqnul00rxLjpv766Cf19DTGbu16FuXhompNR5roRs1GWrpsHHGMCZVaiWNnwZSsw2LbNNy-zSavhFy2dVXdpN9Z8-azU0Bpz904xwQiX_BvlHcrw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455788645</pqid></control><display><type>article</type><title>Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Wiley-Blackwell Open Access Titles</source><creator>Kozik, Rafał ; Choraś, Michał</creator><contributor>García-Teodoro, Pedro ; Pedro García-Teodoro</contributor><creatorcontrib>Kozik, Rafał ; Choraś, Michał ; García-Teodoro, Pedro ; Pedro García-Teodoro</creatorcontrib><description>As computer and network technologies evolve, the complexity of cybersecurity has dramatically increased. Advanced cyber threats have led to current approaches to cyber-attack detection becoming ineffective. Many currently used computer systems and applications have never been deeply tested from a cybersecurity point of view and are an easy target for cyber criminals. The paradigm of security by design is still more of a wish than a reality, especially in the context of constantly evolving systems. On the other hand, protection technologies have also improved. Recently, Big Data technologies have given network administrators a wide spectrum of tools to combat cyber threats. In this paper, we present an innovative system for network traffic analysis and anomalies detection to utilise these tools. The systems architecture is based on a Big Data processing framework, data mining, and innovative machine learning techniques. So far, the proposed system implements pattern extraction strategies that leverage batch processing methods. As a use case we consider the problem of botnet detection by means of data in the form of NetFlows. Results are promising and show that the proposed system can be a useful tool to improve cybersecurity.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2017/6047053</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Algorithms ; Anomalies ; Batch processing ; Behavior ; Big Data ; Communication ; Communications traffic ; Computer architecture ; Cybersecurity ; Data mining ; Data processing ; Datasets ; Machine learning ; Malware ; R&D ; Research & development ; Software</subject><ispartof>Security and communication networks, 2017-01, Vol.2017 (2017), p.1-10</ispartof><rights>Copyright © 2017 Rafał Kozik and Michał Choraś.</rights><rights>Copyright © 2017 Rafał Kozik and Michał Choraś. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-ae5d28f8231a1a36506256463a31a8eef87bf45fe0fd03661babb2db179df7663</citedby><cites>FETCH-LOGICAL-c360t-ae5d28f8231a1a36506256463a31a8eef87bf45fe0fd03661babb2db179df7663</cites><orcidid>0000-0001-7122-3306</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>García-Teodoro, Pedro</contributor><contributor>Pedro García-Teodoro</contributor><creatorcontrib>Kozik, Rafał</creatorcontrib><creatorcontrib>Choraś, Michał</creatorcontrib><title>Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection</title><title>Security and communication networks</title><description>As computer and network technologies evolve, the complexity of cybersecurity has dramatically increased. Advanced cyber threats have led to current approaches to cyber-attack detection becoming ineffective. Many currently used computer systems and applications have never been deeply tested from a cybersecurity point of view and are an easy target for cyber criminals. The paradigm of security by design is still more of a wish than a reality, especially in the context of constantly evolving systems. On the other hand, protection technologies have also improved. Recently, Big Data technologies have given network administrators a wide spectrum of tools to combat cyber threats. In this paper, we present an innovative system for network traffic analysis and anomalies detection to utilise these tools. The systems architecture is based on a Big Data processing framework, data mining, and innovative machine learning techniques. So far, the proposed system implements pattern extraction strategies that leverage batch processing methods. As a use case we consider the problem of botnet detection by means of data in the form of NetFlows. Results are promising and show that the proposed system can be a useful tool to improve cybersecurity.</description><subject>Algorithms</subject><subject>Anomalies</subject><subject>Batch processing</subject><subject>Behavior</subject><subject>Big Data</subject><subject>Communication</subject><subject>Communications traffic</subject><subject>Computer architecture</subject><subject>Cybersecurity</subject><subject>Data mining</subject><subject>Data processing</subject><subject>Datasets</subject><subject>Machine learning</subject><subject>Malware</subject><subject>R&D</subject><subject>Research & development</subject><subject>Software</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0E1PAjEQBuDGaCKiN8-miUdd7XeXIyD4EaIe9Nx02aksgS22RfTfu7hEj55mMnlmJnkROqXkilIprxmh-loRoYnke6hDe7yXEcrY_m9PxSE6inFOiKJCiw56eLYpQajx6DMFO02Vr3F_8eZDlWZL7HzAj5DGC7_JBjZCiQc-1ZBwv5EfVaog4htI8LN3jA6cXUQ42dUueh2PXoZ32eTp9n7Yn2RTrkjKLMiS5S5nnFpquZJEMamE4rYZ5AAu14UT0gFxJeFK0cIWBSsLqnul00rxLjpv766Cf19DTGbu16FuXhompNR5roRs1GWrpsHHGMCZVaiWNnwZSsw2LbNNy-zSavhFy2dVXdpN9Z8-azU0Bpz904xwQiX_BvlHcrw</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Kozik, Rafał</creator><creator>Choraś, Michał</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-7122-3306</orcidid></search><sort><creationdate>20170101</creationdate><title>Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection</title><author>Kozik, Rafał ; Choraś, Michał</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-ae5d28f8231a1a36506256463a31a8eef87bf45fe0fd03661babb2db179df7663</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Algorithms</topic><topic>Anomalies</topic><topic>Batch processing</topic><topic>Behavior</topic><topic>Big Data</topic><topic>Communication</topic><topic>Communications traffic</topic><topic>Computer architecture</topic><topic>Cybersecurity</topic><topic>Data mining</topic><topic>Data processing</topic><topic>Datasets</topic><topic>Machine learning</topic><topic>Malware</topic><topic>R&D</topic><topic>Research & development</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kozik, Rafał</creatorcontrib><creatorcontrib>Choraś, Michał</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kozik, Rafał</au><au>Choraś, Michał</au><au>García-Teodoro, Pedro</au><au>Pedro García-Teodoro</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection</atitle><jtitle>Security and communication networks</jtitle><date>2017-01-01</date><risdate>2017</risdate><volume>2017</volume><issue>2017</issue><spage>1</spage><epage>10</epage><pages>1-10</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>As computer and network technologies evolve, the complexity of cybersecurity has dramatically increased. Advanced cyber threats have led to current approaches to cyber-attack detection becoming ineffective. Many currently used computer systems and applications have never been deeply tested from a cybersecurity point of view and are an easy target for cyber criminals. The paradigm of security by design is still more of a wish than a reality, especially in the context of constantly evolving systems. On the other hand, protection technologies have also improved. Recently, Big Data technologies have given network administrators a wide spectrum of tools to combat cyber threats. In this paper, we present an innovative system for network traffic analysis and anomalies detection to utilise these tools. The systems architecture is based on a Big Data processing framework, data mining, and innovative machine learning techniques. So far, the proposed system implements pattern extraction strategies that leverage batch processing methods. As a use case we consider the problem of botnet detection by means of data in the form of NetFlows. Results are promising and show that the proposed system can be a useful tool to improve cybersecurity.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2017/6047053</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0001-7122-3306</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2017-01, Vol.2017 (2017), p.1-10 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2455788645 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Wiley-Blackwell Open Access Titles |
subjects | Algorithms Anomalies Batch processing Behavior Big Data Communication Communications traffic Computer architecture Cybersecurity Data mining Data processing Datasets Machine learning Malware R&D Research & development Software |
title | Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T17%3A51%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Pattern%20Extraction%20Algorithm%20for%20NetFlow-Based%20Botnet%20Activities%20Detection&rft.jtitle=Security%20and%20communication%20networks&rft.au=Kozik,%20Rafa%C5%82&rft.date=2017-01-01&rft.volume=2017&rft.issue=2017&rft.spage=1&rft.epage=10&rft.pages=1-10&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2017/6047053&rft_dat=%3Cproquest_cross%3E2455788645%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455788645&rft_id=info:pmid/&rfr_iscdi=true |