TY - JOUR AU - Amini, Pedram AU - Azmi, Reza AU - Araghizadeh, Muhammad Amin PY - 2019/05/24 Y2 - 2024/03/28 TI - Analysis of Network Traffic Flows for Centralized Botnet Detection JF - Journal of Telecommunication, Electronic and Computer Engineering (JTEC) JA - JTEC VL - 11 IS - 2 SE - Articles DO - UR - https://jtec.utem.edu.my/jtec/article/view/4733 SP - 7-17 AB - At present, the Internet users are facing the most serious threats considering the malwares have become a powerful tool for attackers. Botnets are one of the most significant malwares. A Bot is an intelligent program run by worms, Trojans or other malicious codes that could perform a group of cyber-attacks on the Internet. Botnets are used for attacks such as stealing data, spam, denial-of-service, phishing etc. A variety of methods and algorithms have been proposed to detect botnets, in which each of them has an emphasis on specific data or methods. Using Netflow data is an effective and agile method compared to other methods in detecting botnets. This research focuses on centralized and HTTP botnets. In the proposed method, we used the hierarchical clustering, XMeans clustering, and rule-based classification. The methods helped to achieve fast and accurate recognition. Hierarchical clustering improved the speed and accuracy rate in the process of separating the flows. The X-Means algorithm led to the highest cohesion inside the clusters and the maximum distance between clusters by choosing optimal K. Using rule-based classification, each cluster with the similar flow is placed in a bot cluster, a semi-bot cluster or a normal cluster. By performing network traffic flow analysis for the proposed method, sets of botnets have been evaluated and the results indicated that more than 95% accuracy in detection. By a minimum overhead, this approach can provide botnet detection with high accuracy and speed. ER -