Detection and Classification of Network Traffic in Bot Network Using Deep Learning
K. Srinarayani,
B. Padmavathi,
Kavitha Datchanamoorthy,
T. Saraswathi,
S. Maheswari and
R. Fatima Vincy
Additional contact information
K. Srinarayani: Department of Computer Science and Engineering, Easwari Engineering College, Ramapuram, Chennai 600089, India
B. Padmavathi: Department of Computer Science and Engineering, Easwari Engineering College, Ramapuram, Chennai 600089, India
Kavitha Datchanamoorthy: Department of Computer Science and Engineering, Easwari Engineering College, Ramapuram, Chennai 600089, India
T. Saraswathi: ��Department of Information Technology, Easwari Engineering College, Ramapuram, Chennai 600089, India
S. Maheswari: Department of Computer Science and Engineering, Easwari Engineering College, Ramapuram, Chennai 600089, India
R. Fatima Vincy: Department of Computer Science and Engineering, Easwari Engineering College, Ramapuram, Chennai 600089, India
Journal of Information & Knowledge Management (JIKM), 2024, vol. 23, issue 06, 1-22
Abstract:
One of the most dangerous threats to computer networks is the use of botnets, which can seriously harm systems and steal private data. They are remote-controlled networks of compromised computers that an individual or group of individuals is using for malicious purposes. These infected computers are frequently called “bots†or “zombies†. A wide variety of malicious activities, including the distribution of malware and credential theft, can be carried out using botnets. The CTU-13 dataset is a collection of network traffic information that includes examples of various botnet types. Using this, our study compares the abilities of decision trees, random forests, 1D convolutional neural networks, and a proposed system based on long short-term memory and residual neural networks to detect botnets. According to our findings, the suggested system performs better than every other algorithm, achieving a higher accuracy rate. Our suggested system has the ability to precisely identify botnet traffic patterns, which can assist organisations in proactively preventing botnet attacks.
Keywords: Botnet; CTU-13 dataset; long short-term memory (LSTM); residual neural network (ResNet) (search for similar items in EconPapers)
Date: 2024
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.worldscientific.com/doi/abs/10.1142/S0219649224500862
Access to full text is restricted to subscribers
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:wsi:jikmxx:v:23:y:2024:i:06:n:s0219649224500862
Ordering information: This journal article can be ordered from
DOI: 10.1142/S0219649224500862
Access Statistics for this article
Journal of Information & Knowledge Management (JIKM) is currently edited by Professor Suliman Hawamdeh
More articles in Journal of Information & Knowledge Management (JIKM) from World Scientific Publishing Co. Pte. Ltd.
Bibliographic data for series maintained by Tai Tone Lim ().