scispace - formally typeset
Open AccessJournal ArticleDOI

Comparison between genetic algorithm and self organizing map to detect botnet network traffic

TLDR
A comparative study is done on Genetic Algorithm and Self Organizing Map to detect the botnet network traffic and both are soft computing techniques used in this paper as data analytics system.
Abstract
In Cyber Security world the botnet attacks are increasing. To detect botnet is a challenging task. Botnet is a group of computers connected in a coordinated fashion to do malicious activities. Many techniques have been developed and used to detect and prevent botnet traffic and the attacks. In this paper, a comparative study is done on Genetic Algorithm (GA) and Self Organizing Map (SOM) to detect the botnet network traffic. Both are soft computing techniques and used in this paper as data analytics system. GA is based on natural evolution process and SOM is an Artificial Neural Network type, uses unsupervised learning techniques. SOM uses neurons and classifies the data according to the neurons. Sample of KDD99 dataset is used as input to GA and SOM.

read more

Citations
More filters
Book ChapterDOI

Machine Learning Algorithms for Network Intrusion Detection

TL;DR: This chapter systematically reviews two groups of common intrusion detection systems using fuzzy logic and artificial neural networks, and evaluates them by utilizing the widely used KDD 99 benchmark dataset.
Book ChapterDOI

Bots a New Evolution of Robots: A Survey

TL;DR: This paper will try to explore different bots based on AI algorithms and try to know why the specific algorithms used in bots are different and also sketch a view of different types of bots in growing demand for automation.
References
More filters
Proceedings ArticleDOI

A self-organizing map and its modeling for discovering malignant network traffic

TL;DR: Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P botnet traffic and other malignant network activity by using a Self-Organizing Map self-trained on denied Internet firewall log entries.
Proceedings ArticleDOI

Data analytics on network traffic flows for botnet behaviour detection

TL;DR: The results show that SOMs possess high potential as a data analytics tool on unknown traffic, and can identify the botnet and normal flows with high confidence approximately 99% of the time on the data sets employed in this work.
Proceedings ArticleDOI

Optimizing false positive in anomaly based intrusion detection using Genetic algorithm

TL;DR: Genetic algorithm (GA) based anomaly detection technique is applied for network intrusion detection with approach for optimization specifically focusing on false positive rate to improve accuracy and performance.
Proceedings ArticleDOI

Intrusion detection system using fuzzy genetic algorithm

TL;DR: This paper presents a fuzzy-genetic approach to detecting network intrusion, and presents the results of the proposed system in terms of accuracy, execution time, and memory allocation.
Proceedings ArticleDOI

Low-rate false alarm intrustion detection system with genetic algorithm approach

TL;DR: An intrusion detection model was created by genetic algorithms (GA) and the construction of the classifying models based on the training data observed from the genetic algorithm by KNN (K-Nearest Neighbors) algorithm has been taken into consideration.
Related Papers (5)