dc.contributor.author | Jagan, Shanmugam | |
dc.contributor.author | Ashish, Ashish | |
dc.contributor.author | Mahdal, Miroslav | |
dc.contributor.author | Isabels, Kenneth Ruth | |
dc.contributor.author | Dhanke, Jyoti | |
dc.contributor.author | Jain, Parita | |
dc.contributor.author | Elangovan, Muniyandy | |
dc.date.accessioned | 2024-02-22T10:31:31Z | |
dc.date.available | 2024-02-22T10:31:31Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Mathematics. 2023, vol. 11, issue 13, art. no. 2840. | cs |
dc.identifier.issn | 2227-7390 | |
dc.identifier.uri | http://hdl.handle.net/10084/152227 | |
dc.description.abstract | Botnets pose a real threat to cybersecurity by facilitating criminal activities like malware
distribution, attacks involving distributed denial of service, fraud, click fraud, phishing, and theft
identification. The methods currently used for botnet detection are only appropriate for specific
botnet commands and control protocols; they do not endorse botnet identification in early phases.
Security guards have used honeypots successfully in several computer security defence systems.
Honeypots are frequently utilised in botnet defence because they can draw botnet compromises,
reveal spies in botnet membership, and deter attacker behaviour. Attackers who build and maintain
botnets must devise ways to avoid honeypot traps. Machine learning methods support identification
and inhibit bot threats to address the problems associated with botnet attacks. To choose the best
features to feed as input to the machine learning classifiers to estimate the performance of botnet
detection, a Kernel-based Ensemble Meta Classifier (KEMC) Strategy is suggested in this work. And
particle swarm optimization (PSO) and genetic algorithm (GA) intelligent optimization algorithms
are used to establish the ideal order. The model covered in this paper is employed to forecast Internet
cyber security circumstances. The Binary Cross-Entropy (loss), the GA-PSO optimizer, the Softsign
activation functions and ensembles were used in the experiment to produce the best results. The
model succeeded because Forfileless malware, gathered from well-known datasets, achieved a total
accuracy of 93.3% with a True Positive (TP) Range of 87.45% at zero False Positive (FP). | cs |
dc.language.iso | en | cs |
dc.publisher | MDPI | cs |
dc.relation.ispartofseries | Mathematics | cs |
dc.relation.uri | https://doi.org/10.3390/math11132840 | cs |
dc.rights | © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. | cs |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | cs |
dc.subject | honeypots | cs |
dc.subject | botnet | cs |
dc.subject | malware | cs |
dc.subject | soft sign | cs |
dc.subject | genetic algorithm | cs |
dc.subject | kernels and cyber threats | cs |
dc.title | A meta-classification model for optimized ZBot malware prediction using learning algorithms | cs |
dc.type | article | cs |
dc.identifier.doi | 10.3390/math11132840 | |
dc.rights.access | openAccess | cs |
dc.type.version | publishedVersion | cs |
dc.type.status | Peer-reviewed | cs |
dc.description.source | Web of Science | cs |
dc.description.volume | 11 | cs |
dc.description.issue | 13 | cs |
dc.description.firstpage | art. no. 2840 | cs |
dc.identifier.wos | 001028282600001 | |