TY - GEN
T1 - Dimensional Feature Reduction for Detecting Botnet Activities
AU - Putra, Muhammad Aidiel Rachman
AU - Ahmad, Tohari
AU - Hostiadi, Dandy Pramana
N1 - Publisher Copyright:
© 2023 Global IT Research Institute (GiRI).
PY - 2023
Y1 - 2023
N2 - Rising number of devices linked to the internet has made computer network security crucial. Those devices may be compromised, forming botnets, one of the most severe threats to network security due to their unique characteristics. An in-depth analysis of various processes, including feature extraction, is required to develop a botnet detection model with reliable performance. In this system, feature extraction is one of feature engineering, which is part of the data pre-processing. To find the best approach, we analyze the impact of feature extraction using dimensional reduction with four techniques: Principal Component Analysis, Truncate Singular Value Decomposition, Factor Analysis, and Fast Independent Component Analysis. The feature extraction results are brought to the classification stage to analyze their impact using several machine learning algorithms such as k-NN, Decision Tree, Random Forest, Naive Bayes, and Logistic Regression. Using the CTU-13, NCC-1, and NCC-2 datasets, it is found that dimensional reduction is suitable with k-NN but not recommended for a tree-based machine learning algorithm.
AB - Rising number of devices linked to the internet has made computer network security crucial. Those devices may be compromised, forming botnets, one of the most severe threats to network security due to their unique characteristics. An in-depth analysis of various processes, including feature extraction, is required to develop a botnet detection model with reliable performance. In this system, feature extraction is one of feature engineering, which is part of the data pre-processing. To find the best approach, we analyze the impact of feature extraction using dimensional reduction with four techniques: Principal Component Analysis, Truncate Singular Value Decomposition, Factor Analysis, and Fast Independent Component Analysis. The feature extraction results are brought to the classification stage to analyze their impact using several machine learning algorithms such as k-NN, Decision Tree, Random Forest, Naive Bayes, and Logistic Regression. Using the CTU-13, NCC-1, and NCC-2 datasets, it is found that dimensional reduction is suitable with k-NN but not recommended for a tree-based machine learning algorithm.
KW - botnet detection
KW - dimensional reduction
KW - intrusion detection system
KW - network infrastructure
KW - network security
UR - http://www.scopus.com/inward/record.url?scp=85152194659&partnerID=8YFLogxK
U2 - 10.23919/ICACT56868.2023.10079359
DO - 10.23919/ICACT56868.2023.10079359
M3 - Conference contribution
AN - SCOPUS:85152194659
T3 - International Conference on Advanced Communication Technology, ICACT
SP - 43
EP - 48
BT - 25th International Conference on Advanced Communications Technology
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 25th International Conference on Advanced Communications Technology, ICACT 2023
Y2 - 19 February 2023 through 22 February 2023
ER -