Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 404))

Abstract

Cyber security has become very significant research area in line due to the increase in the number of malicious attacks by both state and nonstate actors. Ideally, one would like to properly secure the machines from being infected by viruses of any form. Nowadays, botnets have become an integral part of the Internet and the main drive for creating them is for financial gain. A bot conceals itself using a secret canal to communicate with its governing command-and-control server. Botnets are well-ordered from end to end using protocols such as IRC, HTTP, and P2P. Of all HTTP-based and IRC-based, P2P botnet detection became a challenging task because of its decentralized nature. The paper focuses on the techniques that are predominantly used in botnet detection and we formulate a method for detecting the P2P botnets using supervised machine learning algorithms such as random forest (RF), multilayer perceptron (MLP), and K-nearest neighbor classifier (KNN). We analyze the performance of selected algorithms there by revealing the best classification algorithm for detecting P2P botnets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barthakur, P., Dahal, M., Ghose, M.K.: An efficient machine learning based classification scheme for detecting distributed command & control traffic of P2P botnets. p. 9 (2013)

    Google Scholar 

  2. Biau, G.: Analysis of a random forests model. JMLR. org, 1063–1095 (2012)

    Google Scholar 

  3. Gandotra, E., Bansal, D., Sofat, S.: Malware Analysis and Classification: A survey. Scientific Research Publishing (2014)

    Google Scholar 

  4. Haddadi, F., Morgan, J., et al.: Botnet behaviour analysis using ip flows: with http filters using classifiers. In: 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 7–12 (2014)

    Google Scholar 

  5. Li, L., Mathur, S., Coskun, B.: Gangs of the internet: towards automatic discovery of peer-to-peer communities. In: IEEE Conference on Communications and Network Security (CNS), pp. 64–72 (2013)

    Google Scholar 

  6. Lu, C., Brooks, R.: Botnet traffic detection using hidden markov models. In: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, p. 31 (2011)

    Google Scholar 

  7. Perényi, M., Dang, T.D., Gefferth, A., Molnár, S.: Identification and analysis of peer-to-peer traffic, pp. 36–46 (2006)

    Google Scholar 

  8. Rahbarinia, B., Perdisci, R., Lanzi, A., Li, K.: Peerrush: Mining for unwanted P2P traffic, pp. 194–208, Elsevier (2014)

    Google Scholar 

  9. Sebastian Garcia, V.U.: Malware capture facility project. http://mcfp.weebly.com/

  10. Singh, K., Agrawal, S.: Comparative analysis of five machine learning algorithms for IP traffic classification. In: International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), pp. 33–38 (2011)

    Google Scholar 

  11. Stevanovic, M., Pedersen, J.M.: Machine learning for identifying botnet network traffic (2013)

    Google Scholar 

  12. Strayer, W.T., Lapsely, D., Walsh, R., Livadas, C.: Botnet detection based on network behavior. Botnet Detection, pp. 1–24. Springer, New York (2008)

    Chapter  Google Scholar 

  13. Vania, J., Meniya, A., Jethva, H.: A review on botnet and detection technique, pp. 23–29 (2013)

    Google Scholar 

  14. Victoria, U.: Isot research lab datasets. http://www.uvic.ca/engineering/ece/isot/datasets/

  15. Zhang, J., Perdisci, R., Lee, W., Luo, X., Sarfraz, U.: Building a scalable system for stealthy P2P-botnet detection. IEEE, pp. 27–38 (2014)

    Google Scholar 

  16. Zhao, D., Traore, I., Sayed, B., Lu, W., Saad, S., Ghorbani, A., Garant, D.: Botnet detection based on traffic behavior analysis and flow intervals. Elsevier, pp. 2–16 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pavani Bharathula .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Bharathula, P., Mridula Menon, N. (2016). Equitable Machine Learning Algorithms to Probe Over P2P Botnets. In: Das, S., Pal, T., Kar, S., Satapathy, S., Mandal, J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, vol 404. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2695-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2695-6_2

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2693-2

  • Online ISBN: 978-81-322-2695-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics