Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of BSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Suleiman Yerima"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    Leveraging Network Traffic Byte-Streams for Machine Learning Based Early Botnet Attack Detection
    (Springer Cham, 2025) Rajesh Thomas; Suleiman Yerima; Khaled Shaalan
    Botnet attacks can overwhelm networks and severely affect the availability of services. Anomaly based detection techniques using machine learning are effective against zero-day attacks. However, they require complex data preprocessing and feature extraction which can affect the early detection of botnet attacks. In this paper we propose a novel approach, for early detection of botnet attacks using machine learning models that learn from byte representation of raw network traffic flows. The study departs from the traditional approach of network-based intrusion detection which relies on flow statistics and other hand-crafted features. We discuss our framework which includes light weight network traffic pre-processing, transformation, and model training. We used the CTU-13 dataset to evaluate the proposed byte-based botnet detection system. Our results show that byte-based representation can provide an effective and ultra lightweight means of developing network intrusion detection systems that can match the performance of traditional approaches, while also enabling early detection of botnet attacks. In our experiments we achieved accuracy of 99.9% consistently across different byte stream sizes for the Decision Tree and Logistic Regression classifiers.
  • Library Website
  • University Website
The British University in Dubai (BUiD)

PO Box 345015 | 1st & 2nd Floors, Block 11, Dubai International Academic City (DIAC)
United Arab Emirates, Phone: +971 4 279 1471, Email: library@buid.ac.ae

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback