Botnet Beacon: Unveiling Covert Networks with Advanced AI Detection Strategies

[{“box”:0,”content”:”[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n

n

Year : July 26, 2024 at 4:48 pm | [if 1553 equals=””] Volume :12 [else] Volume :12[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 02 | Page : –

n

n

n

n

n

n

By

n

[foreach 286]n

vector

n

n

Kapil Kumar, Manju Khari,

n

    n t

  • n

n

n[/foreach]

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Research Scholar, Professor School of Computer and Systems Sciences, Jawaharlal Nehru University, School of Computer and Systems Sciences, Jawaharlal Nehru University New Delhi, New Delhi India, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

nSecuring information technology systems is paramount in today’s interconnected world, where the reliability and security of networks and applications are of utmost importance. In this context, the development of a Botnet Detection System (BDS) that harnesses the power of AI classification algorithms becomes a critical endeavor. The primary objective of this work is to construct a comprehensive framework for a BDS that can efficiently gather network data and subject it to rigorous analysis using AI algorithms. To achieve this objective, the authors have chosen to utilize the botnet dataset, a widely recognized benchmark in the field, for training the classifier. This dataset serves as a rich source of information containing various network traffic data, particularly focusing on essential features that are crucial for attack classification. By employing this dataset, the authors ensure that the BDS is trained on a diverse set of network behaviors and attack patterns, enabling it to recognize and differentiate between legitimate and malicious activities effectively. The performance of the BDS is evaluated through a rigorous assessment, encompassing metrics such as accuracy, precision, and detection rate. These metrics are essential in gauging the BDS’s ability to correctly identify and classify botnet activities while minimizing false positives. By conducting this comprehensive evaluation, the authors aim to ensure that the BDS is not only capable of detecting botnets but does so with a high degree of accuracy and reliability.

n

n

n

Keywords: Botnet Detection System (BDS), Artificial Neural Network (ANN), software-defined networking (SDN), machine learning, information security

n[if 424 equals=”Regular Issue”][This article belongs to Research & Reviews: A Journal of Embedded System & Applications(rrjoesa)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Research & Reviews: A Journal of Embedded System & Applications(rrjoesa)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Kapil Kumar, Manju Khari. Botnet Beacon: Unveiling Covert Networks with Advanced AI Detection Strategies. Research & Reviews: A Journal of Embedded System & Applications. July 26, 2024; 12(02):-.

n

How to cite this URL: Kapil Kumar, Manju Khari. Botnet Beacon: Unveiling Covert Networks with Advanced AI Detection Strategies. Research & Reviews: A Journal of Embedded System & Applications. July 26, 2024; 12(02):-. Available from: https://journals.stmjournals.com/rrjoesa/article=July 26, 2024/view=0

nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n

n[if 992 not_equal=’Open Access’] [/if 992]n

n

n

nn[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

n

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Alhakami W. Alerts clustering for intrusion detection systems: overview and machine learning perspectives. International Journal of Advanced Computer Science and Applications. 2019;10(5):573-582.
  2. Almseidin M, Alzubi M, Kovacs S, Alkasassbeh M. Evaluation of machine learning algorithms for intrusion detection system. In2017 IEEE 15th international symposium on intelligent systems and informatics (SISY) 2017 Sep 14 (pp. 000277-000282). IEEE.
  3. Iraqi O, El Bakkali H. Application‐Level Unsupervised Outlier‐Based Intrusion Detection and Prevention. Security and Communication Networks. 2019;2019(1):8368473.
  4. Lai Y, Zhang J, Liu Z. Industrial anomaly detection and attack classification method based on convolutional neural network. Security and Communication Networks. 2019;2019(1):8124254.
  5. Min E, Long J, Liu Q, Cui J, Chen W. TR‐IDS: Anomaly‐based intrusion detection through text‐convolutional neural network and random forest. Security and Communication Networks. 2018;2018(1):4943509.
  6. Yan B, Han G. LA‐GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network. security and communication networks. 2018;2018(1):6026878.
  7. Woodiss-Field A, Johnstone MN, Haskell-Dowland P. Examination of Traditional Botnet Detection on IoT-Based Bots. Sensors. 2024 Feb 5;24(3):1027.
  8. Lagraa S, Husák M, Seba H, Vuppala S, State R, Ouedraogo M. A review on graph-based approaches for network security monitoring and botnet detection. International Journal of Information Security. 2024 Feb;23(1):119-40.
  9. Wu G, Wang X, Zhang J. PeerG: A P2P botnet detection method based on representation learning and graph contrastive learning. Computers & Security. 2024 May 1;140:103775.
  10. Wei C, Xie G, Diao Z. A lightweight deep learning framework for botnet detecting at the IoT edge. Computers & Security. 2023 Jun 1;129:103195.
  11. Moorthy RS, Nathiya N. Botnet detection using artificial intelligence. Procedia Computer Science. 2023 Jan 1;218:1405-13.
  12. Xing Y, Shu H, Zhao H, Li D, Guo L. Survey on botnet detection techniques: Classification, methods, and evaluation. Mathematical Problems in Engineering. 2021;2021(1):6640499.
  13. Shinan K, Alsubhi K, Alzahrani A, Ashraf MU. Machine learning-based botnet detection in software-defined network: A systematic review. Symmetry. 2021 May 12;13(5):866.
  14. Shi WC, Sun HM. DeepBot: a time-based botnet detection with deep learning. Soft Computing. 2020 Nov;24(21):16605-16.
  15. Ibrahim WN, Anuar S, Selamat A, Krejcar O, Crespo RG, Herrera-Viedma E, Fujita H. Multilayer framework for botnet detection using machine learning algorithms. IEEE Access. 2021 Feb 22;9:48753-68.
  16. Mahesh B. Machine learning algorithms-a review. International Journal of Science and Research (IJSR).[Internet]. 2020 Jan;9(1):381-6.
  17. Sarker IH. Machine learning: Algorithms, real-world applications and research directions. SN computer science. 2021 May;2(3):160.
  18. Saranya T, Sridevi S, Deisy C, Chung TD, Khan MA. Performance analysis of machine learning algorithms in intrusion detection system: A review. Procedia Computer Science. 2020 Jan 1;171:1251-60.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n

n

Volume 12
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 02
Received July 17, 2024
Accepted July 23, 2024
Published July 26, 2024

n

n

n

n

n

n nfunction myFunction2() {nvar x = document.getElementById(“browsefigure”);nif (x.style.display === “block”) {nx.style.display = “none”;n}nelse { x.style.display = “Block”; }n}ndocument.querySelector(“.prevBtn”).addEventListener(“click”, () => {nchangeSlides(-1);n});ndocument.querySelector(“.nextBtn”).addEventListener(“click”, () => {nchangeSlides(1);n});nvar slideIndex = 1;nshowSlides(slideIndex);nfunction changeSlides(n) {nshowSlides((slideIndex += n));n}nfunction currentSlide(n) {nshowSlides((slideIndex = n));n}nfunction showSlides(n) {nvar i;nvar slides = document.getElementsByClassName(“Slide”);nvar dots = document.getElementsByClassName(“Navdot”);nif (n > slides.length) { slideIndex = 1; }nif (n (item.style.display = “none”));nArray.from(dots).forEach(nitem => (item.className = item.className.replace(” selected”, “”))n);nslides[slideIndex – 1].style.display = “block”;ndots[slideIndex – 1].className += ” selected”;n}n”}]