Leveraging image representation of network traffic data and transfer learning in botnet detection

The advancements in the Internet has enabled connecting more devices into this technology every day. The emergence of the Internet of Things has aggregated this growth. Lack of security in an IoT world makes these devices hot targets for cyber criminals to perform their malicious actions. One of the...

Full description

Bibliographic Details
Main Authors: Salem, M. (Author), Taheri, S. (Author), Yuan, J.-S (Author)
Format: Article
Language:English
Published: MDPI AG 2018
Subjects:
Online Access:View Fulltext in Publisher
LEADER 03757nam a2200205Ia 4500
001 10.3390-bdcc2040037
008 220706s2018 CNT 000 0 und d
020 |a 25042289 (ISSN) 
245 1 0 |a Leveraging image representation of network traffic data and transfer learning in botnet detection 
260 0 |b MDPI AG  |c 2018 
856 |z View Fulltext in Publisher  |u https://doi.org/10.3390/bdcc2040037 
520 3 |a The advancements in the Internet has enabled connecting more devices into this technology every day. The emergence of the Internet of Things has aggregated this growth. Lack of security in an IoT world makes these devices hot targets for cyber criminals to perform their malicious actions. One of these actions is the Botnet attack, which is one of the main destructive threats that has been evolving since 2003 into different forms. This attack is a serious threat to the security and privacy of information. Its scalability, structure, strength, and strategy are also under successive development, and that it has survived for decades. A bot is defined as a software application that executes a number of automated tasks (simple but structurally repetitive) over the Internet. Several bots make a botnet that infects a number of devices and communicates with their controller called the botmaster to get their instructions. A botnet executes tasks with a rate that would be impossible to be done by a human being. Nowadays, the activities of bots are concealed in between the normal web flows and occupy more than half of all web traffic. The largest use of bots is in web spidering (web crawler), in which an automated script fetches, analyzes, and files information from web servers. They also contribute to other attacks, such as distributed denial of service (DDoS), SPAM, identity theft, phishing, and espionage. A number of botnet detection techniques have been proposed, such as honeynet-based and Intrusion Detection System (IDS)-based. These techniques are not effective anymore due to the constant update of the bots and their evasion mechanisms. Recently, botnet detection techniques based upon machine/deep learning have been proposed that are more capable in comparison to their previously mentioned counterparts. In this work, we propose a deep learning-based engine for botnet detection to be utilized in the IoT and the wearable devices. In this system, the normal and botnet network traffic data are transformed into image before being given into a deep convolutional neural network, named DenseNet with and without considering transfer learning. The system is implemented using Python programming language and the CTU-13 Dataset is used for evaluation in one study. According to our simulation results, using transfer learning can improve the accuracy from 33.41% up to 99.98%. In addition, two other classifiers of Support Vector Machine (SVM) and logistic regression have been used. They showed an accuracy of 83.15% and 78.56%, respectively. In another study, we evaluate our system by an in-house live normal dataset and a solely botnet dataset. Similarly, the system performed very well in data classification in these studies. To examine the capability of our system for real-time applications, we measure the system training and testing times. According to our examination, it takes 0.004868 milliseconds to process each packet from the network traffic data during testing. © 2018 by the authors. Licensee MDPI, Basel, Switzerland. 
650 0 4 |a Botnet detection 
650 0 4 |a Convolutional neural networks 
650 0 4 |a Machine learning 
650 0 4 |a Traffic-to-image transformation 
700 1 |a Salem, M.  |e author 
700 1 |a Taheri, S.  |e author 
700 1 |a Yuan, J.-S.  |e author 
773 |t Big Data and Cognitive Computing