Zobrazit minimální záznam

dc.contributor.authorJagan, Shanmugam
dc.contributor.authorAshish, Ashish
dc.contributor.authorMahdal, Miroslav
dc.contributor.authorIsabels, Kenneth Ruth
dc.contributor.authorDhanke, Jyoti
dc.contributor.authorJain, Parita
dc.contributor.authorElangovan, Muniyandy
dc.date.accessioned2024-02-22T10:31:31Z
dc.date.available2024-02-22T10:31:31Z
dc.date.issued2023
dc.identifier.citationMathematics. 2023, vol. 11, issue 13, art. no. 2840.cs
dc.identifier.issn2227-7390
dc.identifier.urihttp://hdl.handle.net/10084/152227
dc.description.abstractBotnets pose a real threat to cybersecurity by facilitating criminal activities like malware distribution, attacks involving distributed denial of service, fraud, click fraud, phishing, and theft identification. The methods currently used for botnet detection are only appropriate for specific botnet commands and control protocols; they do not endorse botnet identification in early phases. Security guards have used honeypots successfully in several computer security defence systems. Honeypots are frequently utilised in botnet defence because they can draw botnet compromises, reveal spies in botnet membership, and deter attacker behaviour. Attackers who build and maintain botnets must devise ways to avoid honeypot traps. Machine learning methods support identification and inhibit bot threats to address the problems associated with botnet attacks. To choose the best features to feed as input to the machine learning classifiers to estimate the performance of botnet detection, a Kernel-based Ensemble Meta Classifier (KEMC) Strategy is suggested in this work. And particle swarm optimization (PSO) and genetic algorithm (GA) intelligent optimization algorithms are used to establish the ideal order. The model covered in this paper is employed to forecast Internet cyber security circumstances. The Binary Cross-Entropy (loss), the GA-PSO optimizer, the Softsign activation functions and ensembles were used in the experiment to produce the best results. The model succeeded because Forfileless malware, gathered from well-known datasets, achieved a total accuracy of 93.3% with a True Positive (TP) Range of 87.45% at zero False Positive (FP).cs
dc.language.isoencs
dc.publisherMDPIcs
dc.relation.ispartofseriesMathematicscs
dc.relation.urihttps://doi.org/10.3390/math11132840cs
dc.rights© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.cs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/cs
dc.subjecthoneypotscs
dc.subjectbotnetcs
dc.subjectmalwarecs
dc.subjectsoft signcs
dc.subjectgenetic algorithmcs
dc.subjectkernels and cyber threatscs
dc.titleA meta-classification model for optimized ZBot malware prediction using learning algorithmscs
dc.typearticlecs
dc.identifier.doi10.3390/math11132840
dc.rights.accessopenAccesscs
dc.type.versionpublishedVersioncs
dc.type.statusPeer-reviewedcs
dc.description.sourceWeb of Sciencecs
dc.description.volume11cs
dc.description.issue13cs
dc.description.firstpageart. no. 2840cs
dc.identifier.wos001028282600001


Soubory tohoto záznamu

Tento záznam se objevuje v následujících kolekcích

Zobrazit minimální záznam

© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Kromě případů, kde je uvedeno jinak, licence tohoto záznamu je © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.