A botnet is a malware application controlled from a distance by a programmer with the assistance of a botmaster.
Botnets can launch enormous cyber-attacks like Denial-of-Service (DOS), phishing, spam, data stealing, and identity theft.
The botnet can also affect the security and privacy of the systems. The conventional approach to detecting botnets is made
by signature-based analysis, which cannot discover botnets that are not visible. The behavior-based analysis appears to be
an appropriate solution to the current botnet characteristics that are constantly developing. This paper aims to develop an
efficient botnet detection algorithm using machine learning with traffic reduction to increase accuracy. Based on
behavioural analysis, a traffic reduction strategy is applied to reduce network traffic to improve overall system performance.
Several network devices are typically used to retrieve network traffic information. With a detection accuracy of 98.4%, the
known and unknown botnet activities are measured using the supplied datasets. The machine learning-based traffic
reduction system has achieved a high rate of traffic reduction, about 82%, and false-positive rates range between 0% to
2%. Both findings demonstrate that the suggested technique is efficient and accurate.
A. Al Shorman, H. Faris, and I. Aljarah, “Unsupervised intelligent system based on one class support vector machine and Grey Wolf
optimization for IoT botnet detection,” Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 7, pp. 2809–2825, Jul. 2019,
doi: 10.1007/s12652-019-01387-y.
B. AsSadhan, A. Bashaiwth, J. Al-Muhtadi, and S. Alshebeili, “Analysis of P2P, IRC and HTTP traffic for botnets detection,” Peer-to-Peer
Networking and Applications, vol. 11, no. 5, pp. 848–861, Jul. 2017, doi: 10.1007/s12083-017-0586-0.
D. Santana, S. Suthaharan, and S. Mohanty, "What we learn from learning-Understanding capabilities and limitations of machine learning in
botnet attacks," 2018, doi: 10.48550/arXiv.1805.01333.
G. Cugola and A. Margara, “Processing flows of information,” ACM Computing Surveys, vol. 44, no. 3, pp. 1–62, Jun. 2012, doi:
10.1145/2187671.2187677.
S. Almutairi, S. Mahfoudh, S. Almutairi, and J. S. Alowibdi, “Hybrid Botnet Detection Based on Host and Network Analysis,” Journal of
Computer Networks and Communications, vol. 2020, pp. 1–16, Jan. 2020, doi: 10.1155/2020/9024726.
G. Sagirlar, B. Carminati, and E. Ferrari, “AutoBotCatcher: Blockchain-Based P2P Botnet Detection for the Internet of Things,” 2018 IEEE
4th International Conference on Collaboration and Internet Computing (CIC), Oct. 2018, doi: 10.1109/cic.2018.00-46.
I. Sreeram and V. P. K. Vuppala, “HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat
algorithm,” Applied Computing and Informatics, vol. 15, no. 1, pp. 59–66, Jan. 2019, doi: 10.1016/j.aci.2017.10.003.
J. Wang and I. Ch. Paschalidis, “Botnet Detection Based on Anomaly and Community Detection,” IEEE Transactions on Control of Network
Systems, vol. 4, no. 2, pp. 392–404, Jun. 2017, doi: 10.1109/tcns.2016.2532804.
C. Venkatesan, D. Balamurugan, T. Thamaraimanalan, and M. Ramkumar, “Efficient Machine Learning Technique for Tumor Classification
Based on Gene Expression Data,” 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS), Mar.
2022, doi: 10.1109/icaccs54159.2022.9785294.
K. Alieyan, A. ALmomani, A. Manasrah, and M. M. Kadhum, “A survey of botnet detection based on DNS,” Neural Computing and
Applications, vol. 28, no. 7, pp. 1541–1558, Dec. 2015, doi: 10.1007/s00521-015-2128-0.
R. U. Khan, X. Zhang, R. Kumar, A. Sharif, N. A. Golilarz, and M. Alazab, “An Adaptive Multi-Layer Botnet Detection Technique Using
Machine Learning Classifiers,” Applied Sciences, vol. 9, no. 11, p. 2375, Jun. 2019, doi: 10.3390/app9112375.
A. Ahammadi, W. H. Hassan, and Z. A. Shamsan, “An Overview of Artificial Intelligence for 5G/6G Wireless Networks Security,” 2022
International Conference on Cyber Resilience (ICCR), Oct. 2022, doi: 10.1109/iccr56254.2022.10024692.
M. Debashi and P. Vickers, “Sonification of Network Traffic for Detecting and Learning About Botnet Behavior,” IEEE Access, vol. 6, pp.
33826–33839, 2018, doi: 10.1109/access.2018.2847349.
V. Cherappa, T. Thangarajan, S. S. Meenakshi Sundaram, F. Hajjej, A. K. Munusamy, and R. Shanmugam, “Energy-Efficient Clustering and
Routing Using ASFO and a Cross-Layer-Based Expedient Routing Protocol for Wireless Sensor Networks,” Sensors, vol. 23, no. 5, p. 2788,
Mar. 2023, doi: 10.3390/s23052788.
R. U. Khan, X. Zhang, R. Kumar, A. Sharif, N. A. Golilarz, and M. Alazab, “An Adaptive Multi-Layer Botnet Detection Technique Using
Machine Learning Classifiers,” Applied Sciences, vol. 9, no. 11, p. 2375, Jun. 2019, doi: 10.3390/app9112375.
X. Hoang and Q. Nguyen, “Botnet Detection Based On Machine Learning Techniques Using DNS Query Data,” Future Internet, vol. 10, no.
5, p. 43, May 2018, doi: 10.3390/fi10050043.
S. García, M. Grill, J. Stiborek, and A. Zunino, “An empirical comparison of botnet detection methods,” Computers & Security, vol. 45,
pp. 100–123, Sep. 2014, doi: 10.1016/j.cose.2014.05.011.
M. Asadi, M. A. Jabraeil Jamali, S. Parsa, and V. Majidnezhad, “Detecting botnet by using particle swarm optimization algorithm based on
voting system,” Future Generation Computer Systems, vol. 107, pp. 95–111, Jun. 2020, doi: 10.1016/j.future.2020.01.055.
S. Garg, S. K. Peddoju, and A. K. Sarje, “Scalable P2P bot detection system based on network data stream,” Peer-to-Peer Networking and
Applications, vol. 9, no. 6, pp. 1209–1225, Feb. 2016, doi: 10.1007/s12083-016-0440-9.
V. H. Bezerra, V. G. T. da Costa, S. Barbon Junior, R. S. Miani, and B. B. Zarpelão, “IoTDS: A One-Class Classification Approach to Detect
Botnets in Internet of Things Devices,” Sensors, vol. 19, no. 14, p. 3188, Jul. 2019, doi: 10.3390/s19143188.
W. N. H. Ibrahim et al., “Multilayer Framework for Botnet Detection Using Machine Learning Algorithms,” IEEE Access, vol. 9, pp. 48753–
48768, 2021, doi: 10.1109/access.2021.3060778.
Acknowledgements
We would like to thank Reviewers for taking the time and effort necessary to review the manuscript. We sincerely appreciate all valuable comments and suggestions, which helped us to improve the quality of the manuscript.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
No data available for above study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Venkatesan C
Venkatesan C
Department of Electronics and Communication Engineering, HKBK College of Engineering, Karnataka, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Venkatesan C, Thamaraimanalan T, Balamurugan D, Gowrishankar J, Manjunath R and Sivaramakrishnan A, “Hybrid Machine Learning Technique to Detect Active Botnet Attacks for Network Security and Privacy”, Journal of Machine and Computing, vol.3, no.4, pp. 523-533, October 2023. doi: 10.53759/7669/jmc202303044.