DeepBot: a time-based botnet detection with deep learning

Over the decades, as the technology of Internet thrives rapidly, more and more kinds of cyber-attacks are blasting out around the world. Among them, botnet is one of the most noxious attacks which has always been challenging to overcome. The difficulties of botnet detection stem from the various for...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Soft computing (Berlin, Germany) Germany), 2020-11, Vol.24 (21), p.16605-16616
Hauptverfasser: Shi, Wan-Chen, Sun, Hung-Min
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 16616
container_issue 21
container_start_page 16605
container_title Soft computing (Berlin, Germany)
container_volume 24
creator Shi, Wan-Chen
Sun, Hung-Min
description Over the decades, as the technology of Internet thrives rapidly, more and more kinds of cyber-attacks are blasting out around the world. Among them, botnet is one of the most noxious attacks which has always been challenging to overcome. The difficulties of botnet detection stem from the various forms of attack since the viruses keep evolving to avoid themselves from being found. Rule-based botnet detection has its shortcoming of detecting dynamically changing features. On the other hand, the more the Internet functionalities are developed, the severer the impacts botnets may cause. In recent years, many network devices have suffered from botnet attacks as the Internet of things technology prospers, which caused great damage in many industries. Consequently, botnet detection has always been a critical issue in computer security field. In this paper, we introduce a method to detect potential botnets by inspecting the behaviors of network traffics from network packets. In the beginning, we sample the given packets by a period of time and extract the behavioral features from a series of packets. By analyzing these features with proposed deep learning models, we can detect the threat of botnets and classify them into different categories.
doi_str_mv 10.1007/s00500-020-04963-z
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918081326</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918081326</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-4a24b6048a490e35e64b7a15773281689521e3b0af8f5c3b01fca7fc2ebd1d843</originalsourceid><addsrcrecordid>eNp9kEtPwzAQhC0EEqXwBzhF4mxYPxLb3KA8ilSJC5wtJ9mUVG0SbFeI_npMg8Sth9XOSjOz0kfIJYNrBqBuAkAOQIGnkaYQdHdEJkwKQZVU5nivOVWFFKfkLIQVAGcqFxNiHhCH-z7eZi6L7QZp6QLWWdnHDmNWY8Qqtn2XfbXxI504ZGt0vmu75Tk5adw64MXfnpL3p8e32ZwuXp9fZncLWglmIpWOy7IAqZ00gCLHQpbKsVwpwTUrtMk5Q1GCa3STV0mwpnKqqTiWNau1FFNyNfYOvv_cYoh21W99l15abpgGzQQvkouPrsr3IXhs7ODbjfPfloH9RWRHRDYhsntEdpdCYgyFZO6W6P-rD6R-ALcOaDo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918081326</pqid></control><display><type>article</type><title>DeepBot: a time-based botnet detection with deep learning</title><source>SpringerNature Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Shi, Wan-Chen ; Sun, Hung-Min</creator><creatorcontrib>Shi, Wan-Chen ; Sun, Hung-Min</creatorcontrib><description>Over the decades, as the technology of Internet thrives rapidly, more and more kinds of cyber-attacks are blasting out around the world. Among them, botnet is one of the most noxious attacks which has always been challenging to overcome. The difficulties of botnet detection stem from the various forms of attack since the viruses keep evolving to avoid themselves from being found. Rule-based botnet detection has its shortcoming of detecting dynamically changing features. On the other hand, the more the Internet functionalities are developed, the severer the impacts botnets may cause. In recent years, many network devices have suffered from botnet attacks as the Internet of things technology prospers, which caused great damage in many industries. Consequently, botnet detection has always been a critical issue in computer security field. In this paper, we introduce a method to detect potential botnets by inspecting the behaviors of network traffics from network packets. In the beginning, we sample the given packets by a period of time and extract the behavioral features from a series of packets. By analyzing these features with proposed deep learning models, we can detect the threat of botnets and classify them into different categories.</description><identifier>ISSN: 1432-7643</identifier><identifier>EISSN: 1433-7479</identifier><identifier>DOI: 10.1007/s00500-020-04963-z</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Artificial Intelligence ; Back propagation ; Computational Intelligence ; Computer viruses ; Control ; Cybersecurity ; Deep learning ; Denial of service attacks ; Digital currencies ; Engineering ; Internet of Things ; Machine learning ; Malware ; Mathematical Logic and Foundations ; Mechatronics ; Methodologies and Application ; Neural networks ; Packets (communication) ; Robotics</subject><ispartof>Soft computing (Berlin, Germany), 2020-11, Vol.24 (21), p.16605-16616</ispartof><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2020</rights><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-4a24b6048a490e35e64b7a15773281689521e3b0af8f5c3b01fca7fc2ebd1d843</citedby><cites>FETCH-LOGICAL-c319t-4a24b6048a490e35e64b7a15773281689521e3b0af8f5c3b01fca7fc2ebd1d843</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s00500-020-04963-z$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918081326?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Shi, Wan-Chen</creatorcontrib><creatorcontrib>Sun, Hung-Min</creatorcontrib><title>DeepBot: a time-based botnet detection with deep learning</title><title>Soft computing (Berlin, Germany)</title><addtitle>Soft Comput</addtitle><description>Over the decades, as the technology of Internet thrives rapidly, more and more kinds of cyber-attacks are blasting out around the world. Among them, botnet is one of the most noxious attacks which has always been challenging to overcome. The difficulties of botnet detection stem from the various forms of attack since the viruses keep evolving to avoid themselves from being found. Rule-based botnet detection has its shortcoming of detecting dynamically changing features. On the other hand, the more the Internet functionalities are developed, the severer the impacts botnets may cause. In recent years, many network devices have suffered from botnet attacks as the Internet of things technology prospers, which caused great damage in many industries. Consequently, botnet detection has always been a critical issue in computer security field. In this paper, we introduce a method to detect potential botnets by inspecting the behaviors of network traffics from network packets. In the beginning, we sample the given packets by a period of time and extract the behavioral features from a series of packets. By analyzing these features with proposed deep learning models, we can detect the threat of botnets and classify them into different categories.</description><subject>Algorithms</subject><subject>Artificial Intelligence</subject><subject>Back propagation</subject><subject>Computational Intelligence</subject><subject>Computer viruses</subject><subject>Control</subject><subject>Cybersecurity</subject><subject>Deep learning</subject><subject>Denial of service attacks</subject><subject>Digital currencies</subject><subject>Engineering</subject><subject>Internet of Things</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Mathematical Logic and Foundations</subject><subject>Mechatronics</subject><subject>Methodologies and Application</subject><subject>Neural networks</subject><subject>Packets (communication)</subject><subject>Robotics</subject><issn>1432-7643</issn><issn>1433-7479</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kEtPwzAQhC0EEqXwBzhF4mxYPxLb3KA8ilSJC5wtJ9mUVG0SbFeI_npMg8Sth9XOSjOz0kfIJYNrBqBuAkAOQIGnkaYQdHdEJkwKQZVU5nivOVWFFKfkLIQVAGcqFxNiHhCH-z7eZi6L7QZp6QLWWdnHDmNWY8Qqtn2XfbXxI504ZGt0vmu75Tk5adw64MXfnpL3p8e32ZwuXp9fZncLWglmIpWOy7IAqZ00gCLHQpbKsVwpwTUrtMk5Q1GCa3STV0mwpnKqqTiWNau1FFNyNfYOvv_cYoh21W99l15abpgGzQQvkouPrsr3IXhs7ODbjfPfloH9RWRHRDYhsntEdpdCYgyFZO6W6P-rD6R-ALcOaDo</recordid><startdate>20201101</startdate><enddate>20201101</enddate><creator>Shi, Wan-Chen</creator><creator>Sun, Hung-Min</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20201101</creationdate><title>DeepBot: a time-based botnet detection with deep learning</title><author>Shi, Wan-Chen ; Sun, Hung-Min</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-4a24b6048a490e35e64b7a15773281689521e3b0af8f5c3b01fca7fc2ebd1d843</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Artificial Intelligence</topic><topic>Back propagation</topic><topic>Computational Intelligence</topic><topic>Computer viruses</topic><topic>Control</topic><topic>Cybersecurity</topic><topic>Deep learning</topic><topic>Denial of service attacks</topic><topic>Digital currencies</topic><topic>Engineering</topic><topic>Internet of Things</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Mathematical Logic and Foundations</topic><topic>Mechatronics</topic><topic>Methodologies and Application</topic><topic>Neural networks</topic><topic>Packets (communication)</topic><topic>Robotics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shi, Wan-Chen</creatorcontrib><creatorcontrib>Sun, Hung-Min</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Soft computing (Berlin, Germany)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shi, Wan-Chen</au><au>Sun, Hung-Min</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>DeepBot: a time-based botnet detection with deep learning</atitle><jtitle>Soft computing (Berlin, Germany)</jtitle><stitle>Soft Comput</stitle><date>2020-11-01</date><risdate>2020</risdate><volume>24</volume><issue>21</issue><spage>16605</spage><epage>16616</epage><pages>16605-16616</pages><issn>1432-7643</issn><eissn>1433-7479</eissn><abstract>Over the decades, as the technology of Internet thrives rapidly, more and more kinds of cyber-attacks are blasting out around the world. Among them, botnet is one of the most noxious attacks which has always been challenging to overcome. The difficulties of botnet detection stem from the various forms of attack since the viruses keep evolving to avoid themselves from being found. Rule-based botnet detection has its shortcoming of detecting dynamically changing features. On the other hand, the more the Internet functionalities are developed, the severer the impacts botnets may cause. In recent years, many network devices have suffered from botnet attacks as the Internet of things technology prospers, which caused great damage in many industries. Consequently, botnet detection has always been a critical issue in computer security field. In this paper, we introduce a method to detect potential botnets by inspecting the behaviors of network traffics from network packets. In the beginning, we sample the given packets by a period of time and extract the behavioral features from a series of packets. By analyzing these features with proposed deep learning models, we can detect the threat of botnets and classify them into different categories.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s00500-020-04963-z</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1432-7643
ispartof Soft computing (Berlin, Germany), 2020-11, Vol.24 (21), p.16605-16616
issn 1432-7643
1433-7479
language eng
recordid cdi_proquest_journals_2918081326
source SpringerNature Journals; ProQuest Central UK/Ireland; ProQuest Central
subjects Algorithms
Artificial Intelligence
Back propagation
Computational Intelligence
Computer viruses
Control
Cybersecurity
Deep learning
Denial of service attacks
Digital currencies
Engineering
Internet of Things
Machine learning
Malware
Mathematical Logic and Foundations
Mechatronics
Methodologies and Application
Neural networks
Packets (communication)
Robotics
title DeepBot: a time-based botnet detection with deep learning
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T10%3A08%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=DeepBot:%20a%20time-based%20botnet%20detection%20with%20deep%20learning&rft.jtitle=Soft%20computing%20(Berlin,%20Germany)&rft.au=Shi,%20Wan-Chen&rft.date=2020-11-01&rft.volume=24&rft.issue=21&rft.spage=16605&rft.epage=16616&rft.pages=16605-16616&rft.issn=1432-7643&rft.eissn=1433-7479&rft_id=info:doi/10.1007/s00500-020-04963-z&rft_dat=%3Cproquest_cross%3E2918081326%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918081326&rft_id=info:pmid/&rfr_iscdi=true