
tion with unknown scenarios (UnknownE), most re-
call scores are 0, as Table 7 indicates. While KnownE
achieves a higher recall score than KnownL in most
observed scenarios, it suggests that KnownE may de-
tect botnets better than KnownL for observed scenar-
ios, and UnknownL may outperform UnknownE for
unobserved scenarios. Therefore, considering all sce-
narios, the early integrating technique performs better
in botnet detection than the late integrating technique.
5 CONCLUSION
In this research, we proposed an integrated machine-
learning methodology to tackle the challenges pre-
sented by botnets. Our approach entailed two inte-
gration methods as detailed in Section 3.5, using ran-
dom forests with distinct network traffic characteris-
tics. We combined these models to detect various bot-
net activities.
The experimental results demonstrated the effec-
tiveness of the integration method in detecting various
botnet behaviors, achieving a remarkably low false
negative rate. Consequently, high recall scores, as
indicated in Table 7. This outcome implies that the
proposed method successfully identified a significant
portion of botnet instances, making it challenging for
botnets to bypass detection using this approach.
Nevertheless, we observed a relatively high false
positive rate in the integration method, as indicated by
the F-1 scores in Table 8 and precision scores in Ta-
ble 6. This limitation can be attributed to the similar-
ities between some botnet and non-botnet behaviors.
It’s crucial to emphasize that the success of this botnet
detection methodology hinges on the individual mod-
els’ quality and their capability to achieve a high level
of accuracy in detecting botnet activities. Further im-
provements in model training and refinement are es-
sential to enhance overall detection performance.
Despite the challenges posed by botnets and the
complexities in their detection, our research presents
a promising step forward in mitigating their threat.
The integration method effectively identified various
botnet behaviors, contributing to improving cyberse-
curity defense measures.
In summary, while there is still room for improve-
ment, the integrating machine-learning method pro-
posed in this study opens new avenues for tackling
botnet-related cybersecurity issues. The late integra-
tion method as mentioned in Section 3.5.1 is better
for real-world scenarios since it can be used on-line
at the end of a network trace. This integration method
is a plug-and-play method where a new model that
contains a new type of botnet or new scenarios can
be added anytime. The research has successfully re-
duced false negatives by integrating several machine-
learning models. However, high false positives and
evolving botnet behaviors remain challenges. There-
fore, future work will focus on reducing false pos-
itives by developing and integrating online learning
and incremental updates. Ensuring the system’s ef-
fectiveness will involve maintaining a diverse dataset
that reflects evolving botnet behaviors.
ACKNOWLEDGEMENTS
This research is partially funded by the FY2023
JAIST Grant for Fundamental Research, Japan Ad-
vanced Insitute of Science and Technology.
REFERENCES
Abrantes, R., Mestre, P., and Cunha, A. (2022). Exploring
dataset manipulation via machine learning for botnet
traffic. Procedia Computer Science, 196:133–141. In-
ternational Conference on ENTERprise Information
Systems / ProjMAN - International Conference on
Project MANagement / HCist - International Confer-
ence on Health and Social Care Information Systems
and Technologies 2021.
Bahs¸i, H., N
˜
omm, S., and La Torre, F. B. (2018). Di-
mensionality reduction for machine learning based iot
botnet detection. In 2018 15th International Con-
ference on Control, Automation, Robotics and Vision
(ICARCV), pages 1857–1862.
Binkley, J. and Singh, S. (2006). An algorithm for anomaly-
based botnet detection. In Workshop on Steps to Re-
ducing Unwanted Traffic on the Internet.
Garc
´
ıa, S. (2014). Identifying, Modeling and Detecting Bot-
net Behaviors in the Network. PhD thesis.
Garc
´
ıa, S., Grill, M., Stiborek, J., and Zunino, A. (2014).
An empirical comparison of botnet detection methods.
Computers & Security, 45:100–123.
Haddadi, F. and Zincir-Heywood, A. N. (2017). Bot-
net behaviour analysis: How would a data analytics-
based system with minimum a priori information per-
form? International Journal of Network Management,
27(4):e1977. e1977 nem.1977.
Hegna, A. (2010). Visualizing spatial and temporal dynam-
ics of a class of irc-based botnets. Master’s thesis,
Institutt for telematikk.
Kuo, C.-C., Tseng, D.-K., Tsai, C.-W., and Yang, C.-S.
(2021). An effective feature extraction mechanism for
intrusion detection system. IEICE Transactions on In-
formation and Systems, E104.D(11):1814–1827.
Rajab, M. A., Zarfoss, J., Monrose, F., and Terzis, A.
(2006). A multifaceted approach to understanding
the botnet phenomenon. In ACM/SIGCOMM Internet
Measurement Conference.
Botnet Detection by Integrating Multiple Machine Learning Models
373