-
RootNode
-
Co-operative College, Mandalay
-
Cooperative College, Phaunggyi
-
Co-operative University, Sagaing
-
Co-operative University, Thanlyin
-
Dagon University
-
Kyaukse University
-
Laquarware Technological college
-
Mandalay Technological University
-
Mandalay University of Distance Education
-
Mandalay University of Foreign Languages
-
Maubin University
-
Mawlamyine University
-
Meiktila University
-
Mohnyin University
-
Myanmar Institute of Information Technology
-
Myanmar Maritime University
-
National Management Degree College
-
Naypyitaw State Academy
-
Pathein University
-
Sagaing University
-
Sagaing University of Education
-
Taunggyi University
-
Technological University, Hmawbi
-
Technological University (Kyaukse)
-
Technological University Mandalay
-
University of Computer Studies, Mandalay
-
University of Computer Studies Maubin
-
University of Computer Studies, Meikhtila
-
University of Computer Studies Pathein
-
University of Computer Studies, Taungoo
-
University of Computer Studies, Yangon
-
University of Dental Medicine Mandalay
-
University of Dental Medicine, Yangon
-
University of Information Technology
-
University of Mandalay
-
University of Medicine 1
-
University of Medicine 2
-
University of Medicine Mandalay
-
University of Myitkyina
-
University of Public Health, Yangon
-
University of Veterinary Science
-
University of Yangon
-
West Yangon University
-
Yadanabon University
-
Yangon Technological University
-
Yangon University of Distance Education
-
Yangon University of Economics
-
Yangon University of Education
-
Yangon University of Foreign Languages
-
Yezin Agricultural University
-
New Index
-
Item
{"_buckets": {"deposit": "dcf2bbbb-1ea2-444c-a710-c53d1fda23b5"}, "_deposit": {"id": "3251", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3251"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3251", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Detecting P2P Botnets Network Traffic Behaviors Using Feature-Based Learning Techniques", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Botnets have become one of the majorthreats on the Internet. They are used to generatespam, carry out DDOS (Distributed Denial ofService) attacks and click-fraud, and steal sensitiveinformation. Nowadays, many researchers interest toanalyze the botnet technology and emphasis thebotnet behaviors. It is needed to classify communicationnetwork traffic which is important fact tostudy the botnet behaviors. In this paper, we proposedan approach to detect botnet activity by analyzing andclassifying network traffic behaviors due to P2P (Peerto Peer) based botnets. This system represents theimportant and most challenging types of botnetcurrently available that based on classifying P2Pbotnets. The classification techniques used indetection framework are RF (Random Forest) andSVM (Support Vector Machine). The performanceevaluation of the two popular classificationtechniques is also presented. According to theexperiments, proposed system has promising accuracyeven with small time window by comparing twomachine learning algorithms."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Botnets"}, {"interim": "Machine Learning"}, {"interim": "HTTP"}, {"interim": "IRC"}, {"interim": "P2P"}, {"interim": "Waledac"}, {"interim": "Storm"}, {"interim": "RF"}, {"interim": "SVM"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "12027.pdf", "filesize": [{"value": "310 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 310000.0, "url": {"url": "https://meral.edu.mm/record/3251/files/12027.pdf"}, "version_id": "77063f17-43d3-4e5d-8259-0b29aa89df1c"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Twelfth International Conference On Computer Applications (ICCA 2014)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thu, Aye Aye"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2014-02-17"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/102"}, "item_title": "Detecting P2P Botnets Network Traffic Behaviors Using Feature-Based Learning Techniques", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003251", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "3251", "relation": {}, "relation_version_is_last": true, "title": ["Detecting P2P Botnets Network Traffic Behaviors Using Feature-Based Learning Techniques"], "weko_shared_id": -1}
Detecting P2P Botnets Network Traffic Behaviors Using Feature-Based Learning Techniques
http://hdl.handle.net/20.500.12678/0000003251
http://hdl.handle.net/20.500.12678/0000003251e91d6079-a7ac-4d13-83b8-9507d72257be
dcf2bbbb-1ea2-444c-a710-c53d1fda23b5
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Detecting P2P Botnets Network Traffic Behaviors Using Feature-Based Learning Techniques | |||||
Language | en | |||||
Publication date | 2014-02-17 | |||||
Authors | ||||||
Thu, Aye Aye | ||||||
Mya, Khin Than | ||||||
Description | ||||||
Botnets have become one of the majorthreats on the Internet. They are used to generatespam, carry out DDOS (Distributed Denial ofService) attacks and click-fraud, and steal sensitiveinformation. Nowadays, many researchers interest toanalyze the botnet technology and emphasis thebotnet behaviors. It is needed to classify communicationnetwork traffic which is important fact tostudy the botnet behaviors. In this paper, we proposedan approach to detect botnet activity by analyzing andclassifying network traffic behaviors due to P2P (Peerto Peer) based botnets. This system represents theimportant and most challenging types of botnetcurrently available that based on classifying P2Pbotnets. The classification techniques used indetection framework are RF (Random Forest) andSVM (Support Vector Machine). The performanceevaluation of the two popular classificationtechniques is also presented. According to theexperiments, proposed system has promising accuracyeven with small time window by comparing twomachine learning algorithms. | ||||||
Keywords | ||||||
Botnets, Machine Learning, HTTP, IRC, P2P, Waledac, Storm, RF, SVM | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/102 | |||||
Journal articles | ||||||
Twelfth International Conference On Computer Applications (ICCA 2014) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |