Index Link

  • RootNode
    • Co-operative College, Mandalay
    • Cooperative College, Phaunggyi
    • Co-operative University, Sagaing
    • Co-operative University, Thanlyin
    • Dagon University
    • Kyaukse University
    • Laquarware Technological college
    • Mandalay Technological University
    • Mandalay University of Distance Education
    • Mandalay University of Foreign Languages
    • Maubin University
    • Mawlamyine University
    • Meiktila University
    • Mohnyin University
    • Myanmar Institute of Information Technology
    • Myanmar Maritime University
    • National Management Degree College
    • Naypyitaw State Academy
    • Pathein University
    • Sagaing University
    • Sagaing University of Education
    • Taunggyi University
    • Technological University, Hmawbi
    • Technological University (Kyaukse)
    • Technological University Mandalay
    • University of Computer Studies, Mandalay
    • University of Computer Studies Maubin
    • University of Computer Studies, Meikhtila
    • University of Computer Studies Pathein
    • University of Computer Studies, Taungoo
    • University of Computer Studies, Yangon
    • University of Dental Medicine Mandalay
    • University of Dental Medicine, Yangon
    • University of Information Technology
    • University of Mandalay
    • University of Medicine 1
    • University of Medicine 2
    • University of Medicine Mandalay
    • University of Myitkyina
    • University of Public Health, Yangon
    • University of Veterinary Science
    • University of Yangon
    • West Yangon University
    • Yadanabon University
    • Yangon Technological University
    • Yangon University of Distance Education
    • Yangon University of Economics
    • Yangon University of Education
    • Yangon University of Foreign Languages
    • Yezin Agricultural University
    • New Index

Item

{"_buckets": {"deposit": "dcf2bbbb-1ea2-444c-a710-c53d1fda23b5"}, "_deposit": {"id": "3251", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3251"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3251", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Detecting P2P Botnets Network Traffic Behaviors Using Feature-Based Learning Techniques", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Botnets have become one of the majorthreats on the Internet. They are used to generatespam, carry out DDOS (Distributed Denial ofService) attacks and click-fraud, and steal sensitiveinformation. Nowadays, many researchers interest toanalyze the botnet technology and emphasis thebotnet behaviors. It is needed to classify communicationnetwork traffic which is important fact tostudy the botnet behaviors. In this paper, we proposedan approach to detect botnet activity by analyzing andclassifying network traffic behaviors due to P2P (Peerto Peer) based botnets. This system represents theimportant and most challenging types of botnetcurrently available that based on classifying P2Pbotnets. The classification techniques used indetection framework are RF (Random Forest) andSVM (Support Vector Machine). The performanceevaluation of the two popular classificationtechniques is also presented. According to theexperiments, proposed system has promising accuracyeven with small time window by comparing twomachine learning algorithms."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Botnets"}, {"interim": "Machine Learning"}, {"interim": "HTTP"}, {"interim": "IRC"}, {"interim": "P2P"}, {"interim": "Waledac"}, {"interim": "Storm"}, {"interim": "RF"}, {"interim": "SVM"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "12027.pdf", "filesize": [{"value": "310 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 310000.0, "url": {"url": "https://meral.edu.mm/record/3251/files/12027.pdf"}, "version_id": "77063f17-43d3-4e5d-8259-0b29aa89df1c"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Twelfth International Conference On Computer Applications (ICCA 2014)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thu, Aye Aye"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2014-02-17"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/102"}, "item_title": "Detecting P2P Botnets Network Traffic Behaviors Using Feature-Based Learning Techniques", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003251", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "3251", "relation": {}, "relation_version_is_last": true, "title": ["Detecting P2P Botnets Network Traffic Behaviors Using Feature-Based Learning Techniques"], "weko_shared_id": -1}

Detecting P2P Botnets Network Traffic Behaviors Using Feature-Based Learning Techniques

http://hdl.handle.net/20.500.12678/0000003251
e91d6079-a7ac-4d13-83b8-9507d72257be
dcf2bbbb-1ea2-444c-a710-c53d1fda23b5
None
Name / File License Actions
12027.pdf 12027.pdf (310 Kb)
Publication type
Article
Upload type
Publication
Title
Title Detecting P2P Botnets Network Traffic Behaviors Using Feature-Based Learning Techniques
Language en
Publication date 2014-02-17
Authors
Thu, Aye Aye
Mya, Khin Than
Description
Botnets have become one of the majorthreats on the Internet. They are used to generatespam, carry out DDOS (Distributed Denial ofService) attacks and click-fraud, and steal sensitiveinformation. Nowadays, many researchers interest toanalyze the botnet technology and emphasis thebotnet behaviors. It is needed to classify communicationnetwork traffic which is important fact tostudy the botnet behaviors. In this paper, we proposedan approach to detect botnet activity by analyzing andclassifying network traffic behaviors due to P2P (Peerto Peer) based botnets. This system represents theimportant and most challenging types of botnetcurrently available that based on classifying P2Pbotnets. The classification techniques used indetection framework are RF (Random Forest) andSVM (Support Vector Machine). The performanceevaluation of the two popular classificationtechniques is also presented. According to theexperiments, proposed system has promising accuracyeven with small time window by comparing twomachine learning algorithms.
Keywords
Botnets, Machine Learning, HTTP, IRC, P2P, Waledac, Storm, RF, SVM
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/102
Journal articles
Twelfth International Conference On Computer Applications (ICCA 2014)
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats