Journal of Machine and Computing


Hybrid Machine Learning Technique to Detect Active Botnet Attacks for Network Security and Privacy



Journal of Machine and Computing

Received On : 15 April 2023

Revised On : 25 July 2023

Accepted On : 25 August 2023

Published On : 05 October 2023

Volume 03, Issue 04

Pages : 523-533


Abstract


A botnet is a malware application controlled from a distance by a programmer with the assistance of a botmaster. Botnets can launch enormous cyber-attacks like Denial-of-Service (DOS), phishing, spam, data stealing, and identity theft. The botnet can also affect the security and privacy of the systems. The conventional approach to detecting botnets is made by signature-based analysis, which cannot discover botnets that are not visible. The behavior-based analysis appears to be an appropriate solution to the current botnet characteristics that are constantly developing. This paper aims to develop an efficient botnet detection algorithm using machine learning with traffic reduction to increase accuracy. Based on behavioural analysis, a traffic reduction strategy is applied to reduce network traffic to improve overall system performance. Several network devices are typically used to retrieve network traffic information. With a detection accuracy of 98.4%, the known and unknown botnet activities are measured using the supplied datasets. The machine learning-based traffic reduction system has achieved a high rate of traffic reduction, about 82%, and false-positive rates range between 0% to 2%. Both findings demonstrate that the suggested technique is efficient and accurate.


Keywords


Network Security; Botnet Attacks; Denial Of Service; Traffic Reduction; Machine Learning.


  1. A. Al Shorman, H. Faris, and I. Aljarah, “Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection,” Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 7, pp. 2809–2825, Jul. 2019, doi: 10.1007/s12652-019-01387-y.
  2. B. AsSadhan, A. Bashaiwth, J. Al-Muhtadi, and S. Alshebeili, “Analysis of P2P, IRC and HTTP traffic for botnets detection,” Peer-to-Peer Networking and Applications, vol. 11, no. 5, pp. 848–861, Jul. 2017, doi: 10.1007/s12083-017-0586-0.
  3. D. Santana, S. Suthaharan, and S. Mohanty, "What we learn from learning-Understanding capabilities and limitations of machine learning in botnet attacks," 2018, doi: 10.48550/arXiv.1805.01333.
  4. G. Cugola and A. Margara, “Processing flows of information,” ACM Computing Surveys, vol. 44, no. 3, pp. 1–62, Jun. 2012, doi: 10.1145/2187671.2187677.
  5. S. Almutairi, S. Mahfoudh, S. Almutairi, and J. S. Alowibdi, “Hybrid Botnet Detection Based on Host and Network Analysis,” Journal of Computer Networks and Communications, vol. 2020, pp. 1–16, Jan. 2020, doi: 10.1155/2020/9024726.
  6. G. Sagirlar, B. Carminati, and E. Ferrari, “AutoBotCatcher: Blockchain-Based P2P Botnet Detection for the Internet of Things,” 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), Oct. 2018, doi: 10.1109/cic.2018.00-46.
  7. I. Sreeram and V. P. K. Vuppala, “HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm,” Applied Computing and Informatics, vol. 15, no. 1, pp. 59–66, Jan. 2019, doi: 10.1016/j.aci.2017.10.003.
  8. J. Wang and I. Ch. Paschalidis, “Botnet Detection Based on Anomaly and Community Detection,” IEEE Transactions on Control of Network Systems, vol. 4, no. 2, pp. 392–404, Jun. 2017, doi: 10.1109/tcns.2016.2532804.
  9. C. Venkatesan, D. Balamurugan, T. Thamaraimanalan, and M. Ramkumar, “Efficient Machine Learning Technique for Tumor Classification Based on Gene Expression Data,” 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS), Mar. 2022, doi: 10.1109/icaccs54159.2022.9785294.
  10. K. Alieyan, A. ALmomani, A. Manasrah, and M. M. Kadhum, “A survey of botnet detection based on DNS,” Neural Computing and Applications, vol. 28, no. 7, pp. 1541–1558, Dec. 2015, doi: 10.1007/s00521-015-2128-0.
  11. R. U. Khan, X. Zhang, R. Kumar, A. Sharif, N. A. Golilarz, and M. Alazab, “An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers,” Applied Sciences, vol. 9, no. 11, p. 2375, Jun. 2019, doi: 10.3390/app9112375.
  12. A. Ahammadi, W. H. Hassan, and Z. A. Shamsan, “An Overview of Artificial Intelligence for 5G/6G Wireless Networks Security,” 2022 International Conference on Cyber Resilience (ICCR), Oct. 2022, doi: 10.1109/iccr56254.2022.10024692.
  13. M. Debashi and P. Vickers, “Sonification of Network Traffic for Detecting and Learning About Botnet Behavior,” IEEE Access, vol. 6, pp. 33826–33839, 2018, doi: 10.1109/access.2018.2847349.
  14. V. Cherappa, T. Thangarajan, S. S. Meenakshi Sundaram, F. Hajjej, A. K. Munusamy, and R. Shanmugam, “Energy-Efficient Clustering and Routing Using ASFO and a Cross-Layer-Based Expedient Routing Protocol for Wireless Sensor Networks,” Sensors, vol. 23, no. 5, p. 2788, Mar. 2023, doi: 10.3390/s23052788.
  15. R. U. Khan, X. Zhang, R. Kumar, A. Sharif, N. A. Golilarz, and M. Alazab, “An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers,” Applied Sciences, vol. 9, no. 11, p. 2375, Jun. 2019, doi: 10.3390/app9112375.
  16. X. Hoang and Q. Nguyen, “Botnet Detection Based On Machine Learning Techniques Using DNS Query Data,” Future Internet, vol. 10, no. 5, p. 43, May 2018, doi: 10.3390/fi10050043.
  17. S. García, M. Grill, J. Stiborek, and A. Zunino, “An empirical comparison of botnet detection methods,” Computers & Security, vol. 45, pp. 100–123, Sep. 2014, doi: 10.1016/j.cose.2014.05.011.
  18. M. Asadi, M. A. Jabraeil Jamali, S. Parsa, and V. Majidnezhad, “Detecting botnet by using particle swarm optimization algorithm based on voting system,” Future Generation Computer Systems, vol. 107, pp. 95–111, Jun. 2020, doi: 10.1016/j.future.2020.01.055.
  19. S. Garg, S. K. Peddoju, and A. K. Sarje, “Scalable P2P bot detection system based on network data stream,” Peer-to-Peer Networking and Applications, vol. 9, no. 6, pp. 1209–1225, Feb. 2016, doi: 10.1007/s12083-016-0440-9.
  20. V. H. Bezerra, V. G. T. da Costa, S. Barbon Junior, R. S. Miani, and B. B. Zarpelão, “IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices,” Sensors, vol. 19, no. 14, p. 3188, Jul. 2019, doi: 10.3390/s19143188.
  21. W. N. H. Ibrahim et al., “Multilayer Framework for Botnet Detection Using Machine Learning Algorithms,” IEEE Access, vol. 9, pp. 48753– 48768, 2021, doi: 10.1109/access.2021.3060778.

Acknowledgements


We would like to thank Reviewers for taking the time and effort necessary to review the manuscript. We sincerely appreciate all valuable comments and suggestions, which helped us to improve the quality of the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


No data available for above study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Venkatesan C, Thamaraimanalan T, Balamurugan D, Gowrishankar J, Manjunath R and Sivaramakrishnan A, “Hybrid Machine Learning Technique to Detect Active Botnet Attacks for Network Security and Privacy”, Journal of Machine and Computing, vol.3, no.4, pp. 523-533, October 2023. doi: 10.53759/7669/jmc202303044.


Copyright


© 2023 Venkatesan C, Thamaraimanalan T, Balamurugan D, Gowrishankar J, Manjunath R and Sivaramakrishnan A. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.