DeepBot: a time-based botnet detection with deep learning
Over the decades, as the technology of Internet thrives rapidly, more and more kinds of cyber-attacks are blasting out around the world. Among them, botnet is one of the most noxious attacks which has always been challenging to overcome. The difficulties of botnet detection stem from the various for...
Gespeichert in:
Veröffentlicht in: | Soft computing (Berlin, Germany) Germany), 2020-11, Vol.24 (21), p.16605-16616 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 16616 |
---|---|
container_issue | 21 |
container_start_page | 16605 |
container_title | Soft computing (Berlin, Germany) |
container_volume | 24 |
creator | Shi, Wan-Chen Sun, Hung-Min |
description | Over the decades, as the technology of Internet thrives rapidly, more and more kinds of cyber-attacks are blasting out around the world. Among them, botnet is one of the most noxious attacks which has always been challenging to overcome. The difficulties of botnet detection stem from the various forms of attack since the viruses keep evolving to avoid themselves from being found. Rule-based botnet detection has its shortcoming of detecting dynamically changing features. On the other hand, the more the Internet functionalities are developed, the severer the impacts botnets may cause. In recent years, many network devices have suffered from botnet attacks as the Internet of things technology prospers, which caused great damage in many industries. Consequently, botnet detection has always been a critical issue in computer security field. In this paper, we introduce a method to detect potential botnets by inspecting the behaviors of network traffics from network packets. In the beginning, we sample the given packets by a period of time and extract the behavioral features from a series of packets. By analyzing these features with proposed deep learning models, we can detect the threat of botnets and classify them into different categories. |
doi_str_mv | 10.1007/s00500-020-04963-z |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918081326</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918081326</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-4a24b6048a490e35e64b7a15773281689521e3b0af8f5c3b01fca7fc2ebd1d843</originalsourceid><addsrcrecordid>eNp9kEtPwzAQhC0EEqXwBzhF4mxYPxLb3KA8ilSJC5wtJ9mUVG0SbFeI_npMg8Sth9XOSjOz0kfIJYNrBqBuAkAOQIGnkaYQdHdEJkwKQZVU5nivOVWFFKfkLIQVAGcqFxNiHhCH-z7eZi6L7QZp6QLWWdnHDmNWY8Qqtn2XfbXxI504ZGt0vmu75Tk5adw64MXfnpL3p8e32ZwuXp9fZncLWglmIpWOy7IAqZ00gCLHQpbKsVwpwTUrtMk5Q1GCa3STV0mwpnKqqTiWNau1FFNyNfYOvv_cYoh21W99l15abpgGzQQvkouPrsr3IXhs7ODbjfPfloH9RWRHRDYhsntEdpdCYgyFZO6W6P-rD6R-ALcOaDo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918081326</pqid></control><display><type>article</type><title>DeepBot: a time-based botnet detection with deep learning</title><source>SpringerNature Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Shi, Wan-Chen ; Sun, Hung-Min</creator><creatorcontrib>Shi, Wan-Chen ; Sun, Hung-Min</creatorcontrib><description>Over the decades, as the technology of Internet thrives rapidly, more and more kinds of cyber-attacks are blasting out around the world. Among them, botnet is one of the most noxious attacks which has always been challenging to overcome. The difficulties of botnet detection stem from the various forms of attack since the viruses keep evolving to avoid themselves from being found. Rule-based botnet detection has its shortcoming of detecting dynamically changing features. On the other hand, the more the Internet functionalities are developed, the severer the impacts botnets may cause. In recent years, many network devices have suffered from botnet attacks as the Internet of things technology prospers, which caused great damage in many industries. Consequently, botnet detection has always been a critical issue in computer security field. In this paper, we introduce a method to detect potential botnets by inspecting the behaviors of network traffics from network packets. In the beginning, we sample the given packets by a period of time and extract the behavioral features from a series of packets. By analyzing these features with proposed deep learning models, we can detect the threat of botnets and classify them into different categories.</description><identifier>ISSN: 1432-7643</identifier><identifier>EISSN: 1433-7479</identifier><identifier>DOI: 10.1007/s00500-020-04963-z</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Artificial Intelligence ; Back propagation ; Computational Intelligence ; Computer viruses ; Control ; Cybersecurity ; Deep learning ; Denial of service attacks ; Digital currencies ; Engineering ; Internet of Things ; Machine learning ; Malware ; Mathematical Logic and Foundations ; Mechatronics ; Methodologies and Application ; Neural networks ; Packets (communication) ; Robotics</subject><ispartof>Soft computing (Berlin, Germany), 2020-11, Vol.24 (21), p.16605-16616</ispartof><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2020</rights><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-4a24b6048a490e35e64b7a15773281689521e3b0af8f5c3b01fca7fc2ebd1d843</citedby><cites>FETCH-LOGICAL-c319t-4a24b6048a490e35e64b7a15773281689521e3b0af8f5c3b01fca7fc2ebd1d843</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s00500-020-04963-z$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918081326?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Shi, Wan-Chen</creatorcontrib><creatorcontrib>Sun, Hung-Min</creatorcontrib><title>DeepBot: a time-based botnet detection with deep learning</title><title>Soft computing (Berlin, Germany)</title><addtitle>Soft Comput</addtitle><description>Over the decades, as the technology of Internet thrives rapidly, more and more kinds of cyber-attacks are blasting out around the world. Among them, botnet is one of the most noxious attacks which has always been challenging to overcome. The difficulties of botnet detection stem from the various forms of attack since the viruses keep evolving to avoid themselves from being found. Rule-based botnet detection has its shortcoming of detecting dynamically changing features. On the other hand, the more the Internet functionalities are developed, the severer the impacts botnets may cause. In recent years, many network devices have suffered from botnet attacks as the Internet of things technology prospers, which caused great damage in many industries. Consequently, botnet detection has always been a critical issue in computer security field. In this paper, we introduce a method to detect potential botnets by inspecting the behaviors of network traffics from network packets. In the beginning, we sample the given packets by a period of time and extract the behavioral features from a series of packets. By analyzing these features with proposed deep learning models, we can detect the threat of botnets and classify them into different categories.</description><subject>Algorithms</subject><subject>Artificial Intelligence</subject><subject>Back propagation</subject><subject>Computational Intelligence</subject><subject>Computer viruses</subject><subject>Control</subject><subject>Cybersecurity</subject><subject>Deep learning</subject><subject>Denial of service attacks</subject><subject>Digital currencies</subject><subject>Engineering</subject><subject>Internet of Things</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Mathematical Logic and Foundations</subject><subject>Mechatronics</subject><subject>Methodologies and Application</subject><subject>Neural networks</subject><subject>Packets (communication)</subject><subject>Robotics</subject><issn>1432-7643</issn><issn>1433-7479</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kEtPwzAQhC0EEqXwBzhF4mxYPxLb3KA8ilSJC5wtJ9mUVG0SbFeI_npMg8Sth9XOSjOz0kfIJYNrBqBuAkAOQIGnkaYQdHdEJkwKQZVU5nivOVWFFKfkLIQVAGcqFxNiHhCH-z7eZi6L7QZp6QLWWdnHDmNWY8Qqtn2XfbXxI504ZGt0vmu75Tk5adw64MXfnpL3p8e32ZwuXp9fZncLWglmIpWOy7IAqZ00gCLHQpbKsVwpwTUrtMk5Q1GCa3STV0mwpnKqqTiWNau1FFNyNfYOvv_cYoh21W99l15abpgGzQQvkouPrsr3IXhs7ODbjfPfloH9RWRHRDYhsntEdpdCYgyFZO6W6P-rD6R-ALcOaDo</recordid><startdate>20201101</startdate><enddate>20201101</enddate><creator>Shi, Wan-Chen</creator><creator>Sun, Hung-Min</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20201101</creationdate><title>DeepBot: a time-based botnet detection with deep learning</title><author>Shi, Wan-Chen ; Sun, Hung-Min</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-4a24b6048a490e35e64b7a15773281689521e3b0af8f5c3b01fca7fc2ebd1d843</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Artificial Intelligence</topic><topic>Back propagation</topic><topic>Computational Intelligence</topic><topic>Computer viruses</topic><topic>Control</topic><topic>Cybersecurity</topic><topic>Deep learning</topic><topic>Denial of service attacks</topic><topic>Digital currencies</topic><topic>Engineering</topic><topic>Internet of Things</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Mathematical Logic and Foundations</topic><topic>Mechatronics</topic><topic>Methodologies and Application</topic><topic>Neural networks</topic><topic>Packets (communication)</topic><topic>Robotics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shi, Wan-Chen</creatorcontrib><creatorcontrib>Sun, Hung-Min</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Soft computing (Berlin, Germany)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shi, Wan-Chen</au><au>Sun, Hung-Min</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>DeepBot: a time-based botnet detection with deep learning</atitle><jtitle>Soft computing (Berlin, Germany)</jtitle><stitle>Soft Comput</stitle><date>2020-11-01</date><risdate>2020</risdate><volume>24</volume><issue>21</issue><spage>16605</spage><epage>16616</epage><pages>16605-16616</pages><issn>1432-7643</issn><eissn>1433-7479</eissn><abstract>Over the decades, as the technology of Internet thrives rapidly, more and more kinds of cyber-attacks are blasting out around the world. Among them, botnet is one of the most noxious attacks which has always been challenging to overcome. The difficulties of botnet detection stem from the various forms of attack since the viruses keep evolving to avoid themselves from being found. Rule-based botnet detection has its shortcoming of detecting dynamically changing features. On the other hand, the more the Internet functionalities are developed, the severer the impacts botnets may cause. In recent years, many network devices have suffered from botnet attacks as the Internet of things technology prospers, which caused great damage in many industries. Consequently, botnet detection has always been a critical issue in computer security field. In this paper, we introduce a method to detect potential botnets by inspecting the behaviors of network traffics from network packets. In the beginning, we sample the given packets by a period of time and extract the behavioral features from a series of packets. By analyzing these features with proposed deep learning models, we can detect the threat of botnets and classify them into different categories.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s00500-020-04963-z</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1432-7643 |
ispartof | Soft computing (Berlin, Germany), 2020-11, Vol.24 (21), p.16605-16616 |
issn | 1432-7643 1433-7479 |
language | eng |
recordid | cdi_proquest_journals_2918081326 |
source | SpringerNature Journals; ProQuest Central UK/Ireland; ProQuest Central |
subjects | Algorithms Artificial Intelligence Back propagation Computational Intelligence Computer viruses Control Cybersecurity Deep learning Denial of service attacks Digital currencies Engineering Internet of Things Machine learning Malware Mathematical Logic and Foundations Mechatronics Methodologies and Application Neural networks Packets (communication) Robotics |
title | DeepBot: a time-based botnet detection with deep learning |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T10%3A08%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=DeepBot:%20a%20time-based%20botnet%20detection%20with%20deep%20learning&rft.jtitle=Soft%20computing%20(Berlin,%20Germany)&rft.au=Shi,%20Wan-Chen&rft.date=2020-11-01&rft.volume=24&rft.issue=21&rft.spage=16605&rft.epage=16616&rft.pages=16605-16616&rft.issn=1432-7643&rft.eissn=1433-7479&rft_id=info:doi/10.1007/s00500-020-04963-z&rft_dat=%3Cproquest_cross%3E2918081326%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918081326&rft_id=info:pmid/&rfr_iscdi=true |