메뉴 건너뛰기




Volumn 46, Issue 8, 2016, Pages 1796-1806

Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection

Author keywords

Botnet intrusion detection; efficient learning; ensembles; feature selection; machine learning (ML)

Indexed keywords

ARTIFICIAL INTELLIGENCE; INSPECTION; LEARNING SYSTEMS; MALWARE; MERCURY (METAL); OPTIMIZATION;

EID: 84946083260     PISSN: 21682267     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCYB.2015.2490802     Document Type: Article
Times cited : (116)

References (53)
  • 4
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Feb.
    • D. E. Denning, "An intrusion-detection model," IEEE Trans. Softw. Eng., vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
    • (1987) IEEE Trans. Softw. Eng. , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 5
    • 84883286084 scopus 로고    scopus 로고
    • Network intrusion detection using random forests
    • St. Andrews, NB, Canada
    • J. Zhang and M. Zulkernine, "Network intrusion detection using random forests," in Proc. PST, St. Andrews, NB, Canada, 2005, pp. 53-61.
    • (2005) Proc. PST , pp. 53-61
    • Zhang, J.1    Zulkernine, M.2
  • 6
    • 0003539116 scopus 로고    scopus 로고
    • Snort-Lightweight intrusion detection for networks
    • Nov.
    • M. Roesch, "Snort-Lightweight intrusion detection for networks," in Proc. USENIX LISA, Nov. 1999.
    • (1999) Proc. USENIX LISA
    • Roesch, M.1
  • 7
    • 34047229997 scopus 로고    scopus 로고
    • An automatically tuning intrusion detection system
    • Apr.
    • Z. Yu, J. J. P. Tsai, and T. Weigert, "An automatically tuning intrusion detection system," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 37, no. 2, pp. 373-384, Apr. 2007.
    • (2007) IEEE Trans. Syst., Man, Cybern. B, Cybern , vol.37 , Issue.2 , pp. 373-384
    • Yu, Z.1    Tsai, J.J.P.2    Weigert, T.3
  • 8
    • 84891062279 scopus 로고    scopus 로고
    • Online adaboostbased parameterized methods for dynamic distributed network intrusion detection
    • Jan.
    • W. Hu, J. Gao, Y. Wang, O. Wu, and S. Maybank, "Online adaboostbased parameterized methods for dynamic distributed network intrusion detection," IEEE Trans. Cybern., vol. 44, no. 1, pp. 66-82, Jan. 2014.
    • (2014) IEEE Trans. Cybern , vol.44 , Issue.1 , pp. 66-82
    • Hu, W.1    Gao, J.2    Wang, Y.3    Wu, O.4    Maybank, S.5
  • 9
    • 33746809369 scopus 로고    scopus 로고
    • Min-max hyperellipsoidal clustering for anomaly detection in network security
    • Aug.
    • S. T. Sarasamma and Q. A. Zhu, "Min-max hyperellipsoidal clustering for anomaly detection in network security," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 36, no. 4, pp. 887-901, Aug. 2006.
    • (2006) IEEE Trans. Syst., Man, Cybern. B, Cybern , vol.36 , Issue.4 , pp. 887-901
    • Sarasamma, S.T.1    Zhu, Q.A.2
  • 10
    • 69249230890 scopus 로고    scopus 로고
    • Intrusion detection by machine learning: A review
    • C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin, "Intrusion detection by machine learning: A review," Expert Syst. Appl., vol. 36, no. 10, pp. 11994-12000, 2009.
    • (2009) Expert Syst. Appl. , vol.36 , Issue.10 , pp. 11994-12000
    • Tsai, C.-F.1    Hsu, Y.-F.2    Lin, C.-Y.3    Lin, W.-Y.4
  • 14
    • 84888288736 scopus 로고    scopus 로고
    • Botnet detection based on traffic behavior analysis and flow intervals
    • Nov.
    • D. Zhao et al., "Botnet detection based on traffic behavior analysis and flow intervals," Comput. Security, vol. 39, pp. 2-16, Nov. 2013.
    • (2013) Comput. Security , vol.39 , pp. 2-16
    • Zhao, D.1
  • 16
    • 85061529860 scopus 로고    scopus 로고
    • BotHunter: Detecting malware infection through IDS-driven dialog correlation
    • Boston, MA, USA
    • G. Gu, P. A. Porras, V. Yegneswaran, M. W. Fong, and W. Lee, "BotHunter: Detecting malware infection through IDS-driven dialog correlation," in Proc. USENIX Security, Boston, MA, USA, 2007, pp. 167-182.
    • (2007) Proc. USENIX Security , pp. 167-182
    • Gu, G.1    Porras, P.A.2    Yegneswaran, V.3    Fong, M.W.4    Lee, W.5
  • 20
    • 84893294290 scopus 로고    scopus 로고
    • Defence against botnets: A formal definition and a general framework
    • Xi'an, China
    • L. Cao and X. Qiu, "Defence against botnets: A formal definition and a general framework," in Proc. IEEE 8th Int. Conf. Netw., Archit. Stor. (NAS), Xi'an, China, 2013, pp. 237-241.
    • (2013) Proc. IEEE 8th Int. Conf. Netw., Archit. Stor. (NAS) , pp. 237-241
    • Cao, L.1    Qiu, X.2
  • 21
    • 51949100998 scopus 로고    scopus 로고
    • Identifying botnets using anomaly detection techniques applied to DNS traffic
    • Las Vegas, NV, USA
    • R. Villamarin-Salomon and J. C. Brustoloni, "Identifying botnets using anomaly detection techniques applied to DNS traffic," in Proc. IEEE 5th Consum. Commun. Netw. Conf. CCNC, Las Vegas, NV, USA, 2008, pp. 476-481.
    • (2008) Proc. IEEE 5th Consum. Commun. Netw. Conf. CCNC , pp. 476-481
    • Villamarin-Salomon, R.1    Brustoloni, J.C.2
  • 23
    • 33744529638 scopus 로고    scopus 로고
    • Evolutionary neural networks for anomaly detection based on the behavior of a program
    • Jun.
    • S.-J. Han and S.-B. Cho, "Evolutionary neural networks for anomaly detection based on the behavior of a program," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 36, no. 3, pp. 559-570, Jun. 2005.
    • (2005) IEEE Trans. Syst., Man, Cybern. B, Cybern , vol.36 , Issue.3 , pp. 559-570
    • Han, S.-J.1    Cho, S.-B.2
  • 24
    • 84882753373 scopus 로고    scopus 로고
    • Botnet detection based on network behavior
    • Medford, MA, USA: Springer
    • W. T. Strayer, D. Lapsely, R. Walsh, and C. Livadas, "Botnet detection based on network behavior," in Botnet Detection. Medford, MA, USA: Springer, 2008, pp. 1-24.
    • (2008) Botnet Detection , pp. 1-24
    • Strayer, W.T.1    Lapsely, D.2    Walsh, R.3    Livadas, C.4
  • 26
    • 80052095850 scopus 로고    scopus 로고
    • Detecting P2P botnets through network behavior analysis and machine learning
    • Montreal, QC, Canada
    • S. Saad et al., "Detecting P2P botnets through network behavior analysis and machine learning," in Proc. 9th Annu. Int. Conf. Privacy, Security Trust (PST), Montreal, QC, Canada, 2011, pp. 174-180.
    • (2011) Proc. 9th Annu. Int. Conf. Privacy, Security Trust (PST) , pp. 174-180
    • Saad, S.1
  • 27
    • 84899126375 scopus 로고    scopus 로고
    • A framework for periodic outlier pattern detection in time-series sequences
    • May
    • F. Rasheed and R. Alhajj, "A framework for periodic outlier pattern detection in time-series sequences," IEEE Trans. Cybern., vol. 44, no. 5, pp. 569-582, May 2014.
    • (2014) IEEE Trans. Cybern , vol.44 , Issue.5 , pp. 569-582
    • Rasheed, F.1    Alhajj, R.2
  • 29
    • 84899529303 scopus 로고    scopus 로고
    • An efficient flow-based botnet detection using supervised machine learning
    • Honolulu, HI, USA
    • M. Stevanovic and J. M. Pedersen, "An efficient flow-based botnet detection using supervised machine learning," in Proc. Int. Conf. Comput., Netw. Commun. (ICNC), Honolulu, HI, USA, 2014, pp. 797-801.
    • (2014) Proc. Int. Conf. Comput., Netw. Commun. (ICNC) , pp. 797-801
    • Stevanovic, M.1    Pedersen, J.M.2
  • 30
    • 77957764541 scopus 로고    scopus 로고
    • Packet sampling for worm and botnet detection in TCP connections
    • Osaka, Japan
    • L. Braun, G. Munz, and G. Carle, "Packet sampling for worm and botnet detection in TCP connections," in Proc. IEEE Netw. Oper. Manage. Symp. (NOMS), Osaka, Japan, 2010, pp. 264-271.
    • (2010) Proc. IEEE Netw. Oper. Manage. Symp. (NOMS) , pp. 264-271
    • Braun, L.1    Munz, G.2    Carle, G.3
  • 31
    • 84979206966 scopus 로고    scopus 로고
    • (Jan.). [Online]
    • (Jan. 2015). French Chapter of Honenynet. [Online]. Available: http://www.honeynet.org/chapters/france
    • (2015) French Chapter of Honenynet
  • 33
    • 77955469676 scopus 로고    scopus 로고
    • An overview of IP flow-based intrusion detection
    • Jul.
    • A. Sperotto et al., "An overview of IP flow-based intrusion detection," IEEE Commun. Surveys Tuts., vol. 12, no. 3, pp. 343-356, Jul. 2010.
    • (2010) IEEE Commun. Surveys Tuts. , vol.12 , Issue.3 , pp. 343-356
    • Sperotto, A.1
  • 34
    • 84890840695 scopus 로고    scopus 로고
    • Entelecheia: Detecting P2P botnets in their waiting stage
    • Brooklyn, NY, USA
    • H. Hang, X. Wei, M. Faloutsos, and T. Eliassi-Rad, "Entelecheia: Detecting P2P botnets in their waiting stage," in Proc. IFIP Netw. Conf., Brooklyn, NY, USA, 2013, pp. 1-9.
    • (2013) Proc. IFIP Netw. Conf. , pp. 1-9
    • Hang, H.1    Wei, X.2    Faloutsos, M.3    Eliassi-Rad, T.4
  • 35
    • 33745561205 scopus 로고    scopus 로고
    • An introduction to variable and feature selection
    • Mar.
    • I. Guyon and A. Elisseeff, "An introduction to variable and feature selection," J. Mach. Learn. Res., vol. 3, pp. 1157-1182, Mar. 2003.
    • (2003) J. Mach. Learn. Res. , vol.3 , pp. 1157-1182
    • Guyon, I.1    Elisseeff, A.2
  • 37
    • 84894646147 scopus 로고    scopus 로고
    • Network anomaly detection: Methods, systems and tools
    • Feb.
    • M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "Network anomaly detection: Methods, systems and tools," IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 303-336. Feb. 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.1 , pp. 303-336
    • Bhuyan, M.H.1    Bhattacharyya, D.K.2    Kalita, J.K.3
  • 38
    • 63749126820 scopus 로고    scopus 로고
    • Features selection for intrusion detection systems based on support vector machines
    • Las Vegas, NV, USA
    • S. Zaman and F. Karray, "Features selection for intrusion detection systems based on support vector machines," in Proc. 6th IEEE Consum. Commun. Netw. Conf. (CCNC), Las Vegas, NV, USA, 2009, pp. 1-8.
    • (2009) Proc. 6th IEEE Consum. Commun. Netw. Conf. (CCNC) , pp. 1-8
    • Zaman, S.1    Karray, F.2
  • 39
    • 0036555992 scopus 로고    scopus 로고
    • Finding representative patterns with ordered projections
    • J. C. Riquelme, J. S. Aguilar-Ruiz, and M. Toro, "Finding representative patterns with ordered projections," Pattern Recognit., vol. 36, no. 4, pp. 1009-1018, 2003.
    • (2003) Pattern Recognit. , vol.36 , Issue.4 , pp. 1009-1018
    • Riquelme, J.C.1    Aguilar-Ruiz, J.S.2    Toro, M.3
  • 40
    • 19744376790 scopus 로고    scopus 로고
    • A divide-and-conquer approach to the pairwise opposite class-nearest neighbor (POC-NN) algorithm
    • T. Raicharoen and C. Lursinsap, "A divide-and-conquer approach to the pairwise opposite class-nearest neighbor (POC-NN) algorithm," Pattern Recognit. Lett., vol. 26, no. 10, pp. 1554-1567, 2005.
    • (2005) Pattern Recognit. Lett. , vol.26 , Issue.10 , pp. 1554-1567
    • Raicharoen, T.1    Lursinsap, C.2
  • 41
    • 0035575921 scopus 로고    scopus 로고
    • Nearest prototype classifier designs: An experimental study
    • J. C. Bezdek and L. I. Kuncheva, "Nearest prototype classifier designs: An experimental study," Int. J. Intell. Syst., vol. 16, no. 12, pp. 1445-1473, 2001.
    • (2001) Int. J. Intell. Syst. , vol.16 , Issue.12 , pp. 1445-1473
    • Bezdek, J.C.1    Kuncheva, L.I.2
  • 42
    • 0036887535 scopus 로고    scopus 로고
    • An efficient prototype merging strategy for the condensed 1-NN rule through class-conditional hierarchical clustering
    • R. A. Mollineda, F. J. Ferri, and E. Vidal, "An efficient prototype merging strategy for the condensed 1-NN rule through class-conditional hierarchical clustering," Pattern Recognit., vol. 35, no. 12, pp. 2771-2782, 2002.
    • (2002) Pattern Recognit. , vol.35 , Issue.12 , pp. 2771-2782
    • Mollineda, R.A.1    Ferri, F.J.2    Vidal, E.3
  • 43
    • 25844469288 scopus 로고    scopus 로고
    • The nearest subclass classifier: A compromise between the nearest mean and nearest neighbor classifier
    • Sep.
    • C. J. Veenman and M. J. T. Reinders, "The nearest subclass classifier: A compromise between the nearest mean and nearest neighbor classifier," IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 9, pp. 1417-1429, Sep. 2005.
    • (2005) IEEE Trans. Pattern Anal. Mach. Intell. , vol.27 , Issue.9 , pp. 1417-1429
    • Veenman, C.J.1    Reinders, M.J.T.2
  • 46
    • 84927753089 scopus 로고    scopus 로고
    • Experimental study of data clustering using k-means and modified algorithms
    • M. P. S. Bhatia and D. Khurana, "Experimental study of data clustering using k-means and modified algorithms," Int. J. Data Mining Knowl. Manage. Process (IJDKP), vol. 3, no. 3, pp. 17-30, 2013.
    • (2013) Int. J. Data Mining Knowl. Manage. Process (IJDKP) , vol.3 , Issue.3 , pp. 17-30
    • Bhatia, M.P.S.1    Khurana, D.2
  • 48
    • 0001781555 scopus 로고    scopus 로고
    • Voronoi diagrams
    • Amsterdam, The Netherlands: Elsevier North Holland
    • F. Aurenhammer and R. Klein, "Voronoi diagrams," Handbook of Computational Geometry, vol. 5. Amsterdam, The Netherlands: Elsevier North Holland, 2000, pp. 201-290.
    • (2000) Handbook of Computational Geometry , vol.5 , pp. 201-290
    • Aurenhammer, F.1    Klein, R.2
  • 49
    • 33744584654 scopus 로고
    • Induction of decision trees
    • J. R. Quinlan, "Induction of decision trees," Mach. Learn., vol. 1, no. 1, pp. 81-106, 1986.
    • (1986) Mach. Learn. , vol.1 , Issue.1 , pp. 81-106
    • Quinlan, J.R.1
  • 50
    • 0030211964 scopus 로고    scopus 로고
    • Bagging predictors
    • L. Breiman, "Bagging predictors," Mach. Learn., vol. 24, no. 2, pp. 123-140, 1996.
    • (1996) Mach. Learn. , vol.24 , Issue.2 , pp. 123-140
    • Breiman, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.