<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>D. Denysiuk);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>A method for detecting botnets in IT infrastructure using a neural network</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dmytro Denysiuk</string-name>
          <email>denysiuk@khmnu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tomas Sochor</string-name>
          <email>tomas.sochor@osu.cz</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mariia Kapustian</string-name>
          <email>kapustian.mariia@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonina Kashtalian</string-name>
          <email>yantonina@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andriy Drozd</string-name>
          <email>andriydrozdit@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Khmelnytskyi National University</institution>
          ,
          <addr-line>Institutska str., 11, Khmelnytskyi, 29016</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Prigo University College European Research University Vítězslava Nezvala 801/1</institution>
          <addr-line>736 01 Havířov</addr-line>
          <country>Czech Republic European Union</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1883</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Information technology has become an integral part of modern life, but with this come new cyber threats. One of them is botnets-networks of infected computers that criminals use for DDoS attacks, data theft, and spam distribution. Traditional detection methods, such as signature analysis and rulebased approaches, often fail to handle these threats, necessitating the implementation of advanced methods. This article presents a botnet detection method in IT infrastructure based on the use of neural networks. The proposed approach involves creating a baseline configuration of the IT infrastructure by a system administrator for further training of neural networks to detect botnet attacks. Experiments conducted on four types of botnets (DDoS, spam, data theft, and cryptocurrency mining) demonstrated high accuracy and efficiency of the system. The method achieved 96% accuracy in detecting DDoS attacks, 93% in detecting spam botnets, 95% in detecting data theft botnets, and 94% in detecting cryptocurrency mining botnets. The use of a genetic algorithm for training neural networks improved detection efficiency. The method demonstrates high detection speed, with an average time of less than one second. Thus, the developed method is an effective tool for ensuring the security of IT infrastructure, confirming the relevance of using neural networks and machine learning for cybersecurity. Further research is aimed at improving the adaptability of neural networks and reducing the computational resources required for model parameter optimization.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;1botnet</kwd>
        <kwd>neural networks</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>it infrastructure</kwd>
        <kwd>anomaly detection</kwd>
        <kwd>ddos attacks</kwd>
        <kwd>threat classification</kwd>
        <kwd>machine learning</kwd>
        <kwd>traffic analysis</kwd>
        <kwd>genetic algorithm</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the modern world, information technology is an integral part of both personal life and the
functioning of organizations. The widespread use of Internet-connected devices has
significantly increased productivity, communication, and process automation. However, these
advancements are accompanied by a rise in threats, among which botnets [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] stand out —
networks of computers infected with malicious software controlled by attackers to carry out
criminal activities.
      </p>
      <p>
        Botnets can be used for various criminal activities, such as distributed denial-of-service
(DDoS) attacks [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], theft of confidential data, spam distribution, and financial fraud. They are
particularly dangerous due to their ability to scale attacks using a large number of infected
devices. With the advancement of technology and the increasing complexity of botnets,
traditional detection methods, such as signature analysis and rule-based methods, often fail to
cope with modern threats.
      </p>
      <p>
        In 2023, there was a significant increase in botnet activity. According to F5 Labs [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the
number of automated attacks on mobile APIs across various industries rose in the first half of
2023. For example, the entertainment industry became the most targeted, with over a quarter
of all traffic to mobile APIs being automated by attackers. In June 2023, the level of automated
attacks in this industry reached 45.5%. According to a report by Spamhaus [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], the number of
command and control (C&amp;C) servers for botnets increased by 16% in the fourth quarter of 2023.
The most significant growth was observed in countries like China and the USA, with a notable
surge in Bulgaria. This underscores the global nature of the threat, which is not confined to any
specific geographic area. The report also noted a 23% increase in new C&amp;C servers for botnets
in the first quarter of 2023. Major threats remain Cobalt Strike and Quakbot, which continue to
dominate the botnet landscape.
      </p>
      <p>
        It is worth noting that a significant portion of botnets is aimed at spreading through IT
infrastructure. Cybercriminals employ various methods to distribute malicious software [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ],
including websites and IT infrastructure servers. Their goal is to infect as many devices as
possible, utilizing their computing resources for further criminal activities. For instance, servers
infected with malware can be used to launch large-scale attacks, such as distributed
denial-ofservice (DDoS) attacks, or to carry out financial fraud.
      </p>
      <p>Modern botnets have become much more sophisticated, using advanced obfuscation
techniques and masking their presence, making detection by traditional methods a significantly
more challenging task. To combat such threats, it is necessary to employ advanced methods of
system behavior and anomaly analysis, which can effectively detect suspicious activity even in
well-protected environments.</p>
      <p>
        The aim of this study is to develop a method for detecting and preventing the spread of
botnet networks using machine learning technologies. One of the tasks is to investigate modern
methods for detecting botnets, particularly those based on system behavior analysis [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The
advantages and disadvantages of existing detection methods and their ability to adapt to new
threats are considered.
      </p>
      <p>The research makes an important contribution to the field of cybersecurity by providing a
comprehensive analysis of modern threats related to botnets, including a review of the latest
trends and attack methods. It also evaluates the effectiveness of both traditional and
contemporary botnet detection methods, highlighting the need to implement cutting-edge
technologies to ensure robust protection. One of the key contributions is the development of a
new method for detecting botnets using neural networks, which significantly enhances the
ability of systems to detect and prevent anomalies in network traffic.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review</title>
      <p>
        Modern botnet detection methods have a number of advantages and disadvantages that should
be considered when designing and implementing cybersecurity systems. machine
learningbased methods include their ability to analyze large amounts of data and identify complex
patterns that may indicate botnet activity. For example, XGBoost algorithms[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and neural
networks can achieve high accuracy in classifying[12] malicious and legitimate activities.
Machine learning allows systems to self-learn and improve their results over time, which is a
great advantage in the face of ever-changing threats[13].
      </p>
      <p>Network traffic analysis[14,15] is another strong point of modern methods, as it allows for
real-time detection of anomalies, which can help to respond quickly to attacks. This approach
is especially useful for detecting DDoS attacks[16], which are characterized by a high volume
of the same type of traffic[17].</p>
      <p>However, these methods have their drawbacks. One of the main challenges is the need for
large and high-quality data sets to train machine learning models. Most existing models perform
well only on the data sets they were trained on, which limits their ability to adapt to new types
of attacks. In addition, machine learning algorithms can be vulnerable to overtraining, where
models perform well on training data but poorly on new, unforeseen data.</p>
      <p>Hybrid methods that combine different techniques can be difficult to implement and require
significant computing resources. Such systems may be less effective in the case of
lowperformance devices, as is often the case in IoT networks.</p>
      <p>Behavioral analysis[18], while effective in detecting atypical patterns, can cause many false
positives, especially in complex and dynamic network environments. These false positives can
overwhelm the cybersecurity system and require additional resources to process them.</p>
      <p>Thus, modern botnet detection methods are powerful tools, but their effective use requires
careful customization and adaptation to specific network conditions. Further research will focus
on developing a method for detecting botnets in IT infrastructures. This will make it possible
to detect a botnet not only when it executes commands, but also at the stage of its distribution
and receipt of commands from external resources</p>
    </sec>
    <sec id="sec-3">
      <title>3. Methodology of research</title>
      <p>In order to develop an effective botnet detection method, it is necessary to first determine which
IT infrastructure it will be used in.</p>
      <p>Since the Internet is constantly evolving and users visit numerous websites, the number of
IT infrastructures serving these sites is constantly increasing.</p>
      <p>At the same time, it should be borne in mind that these infrastructures are at risk because
they can potentially be carriers of botnet codes. Accordingly, the botnet detection method will
be aimed at protecting the IT infrastructure of web portals.</p>
      <p>Figure 1 shows a block diagram of the method of detecting a botnet in the IT infrastructure
of a web service. It consists of several components.</p>
      <p>The system configuration unit plays a key role in determining the initial parameters of the
IT infrastructure. It is configured by the network administrator and includes important data
specific to the infrastructure.</p>
      <p>The network administrator determines what resources are available for use by the
infrastructure, what processes can be run, what amounts of RAM are required for its
functioning, and what operations can be performed with what types of files.</p>
      <p>This block sets the initial parameters for training a neural network designed to detect
botnets. In particular, it provides the neural network with the necessary initial data for training,
which allows it to adapt to the specific conditions and requirements of a given IT infrastructure.</p>
      <p>The system configuration block can be represented as a set of parameters that define the
initial settings of the IT infrastructure. Let  − a set of system configuration parameters that
includes the following elements:</p>
      <p>= { ,  ,  ,  }
where  − is a set of resources available for use by the infrastructure,  − a set of processes
that can be run in the infrastructure,  − the amount of RAM required for the system to
function,  − a set of operations with file types that can be performed within the infrastructure.</p>
      <p>The determination of available resources includes accounting for server computing power,
storage capacity, and network bandwidth.</p>
      <p>The administrator also determines the permissible processes and services that can be run on
the servers, which helps to avoid running unauthorized or malicious programs. In addition,
configuring the amount of RAM is an important aspect, as it affects system performance and its
ability to process large amounts of data in real time. Correctly determining the amount of RAM
allows you to avoid system overload and ensure stable operation. Each of these elements can
be described in detail as follows:
bandwidth, etc. The set of processes can be described as follows:
where   − represents a single resource, such as server computing power, network
 = { 1,  2, … ,   }
 = { 1,  2, … ,   }
amount of RAM can be designated as:
where   − an acceptable process or service that can be run in the infrastructure. The

= 

≤ 
≤ 

where 
stable system operation.</p>
      <p>,</p>
      <p />
      <p>File and file type operations are also important aspects of configuration. The network
administrator determines what types of files can be processed, stored, or transmitted over the
network, which allows you to control data flows and prevent the spread of malware. File
operations can be described as follows:
− minus the minimum and maximum amounts of RAM required for</p>
      <p>= {( 1,  1), ( 2,  2), … , (  ,   )}
where   − file type,   − an operation that can be performed on a file of this type (read,
write, delete, etc.).
services.</p>
      <p>Thus, the system configuration block configures the main parameters of the IT infrastructure
necessary for its uninterrupted operation and effective protection against threats. This is the
foundation for further implementation and use of botnet detection methods within web</p>
      <p>The System Monitor block plays a key role in collecting and structuring the data required
for monitoring and analyzing the IT infrastructure. Its main function is to ensure the security
and stability of the system by providing up-to-date information about the status of resources
and network activity.</p>
      <p>System Monitor collects data on resource utilization, including server processing power,
network bandwidth, and other critical components. This process involves monitoring metrics
such as CPU utilization, disk space utilization, and network traffic. Information about resource
utilization allows you to identify anomalies that may indicate the presence of botnet activity.</p>
      <p>In addition, System Monitor monitors running processes, collecting data on all active tasks
and services. This includes information about process identifiers, their execution time, resource
usage by each process, and their interaction with other system components. Analyzing this data
helps to identify unauthorized or malicious processes that may be part of a botnet.</p>
      <p>Control over the use of RAM is also included in the System Monitor functions. This involves
collecting data on current memory usage, memory allocation between processes, and detecting
potential memory leaks. Monitoring the use of RAM is critical to ensuring efficient system
operation and preventing overloading. In addition, System Monitor monitors file operations,
collecting data on file creation, modification, deletion, and access. Information about file
operations allows you to detect suspicious activity, such as unauthorized changes to system
files or mass deletion of data, which can be signs of a botnet attack.</p>
      <p>The collected data is structured and stored in the form of logs and other formats, which
allows for further analysis and processing. Based on this data, machine learning models can be
developed to detect anomalies and predict potential threats. Thus, System Monitor provides the
basis for detecting botnets and protecting IT infrastructure from malicious activity, helping to
increase the level of security and reliability of the system.</p>
      <p>After receiving data from the System Monitor unit, the data is processed in the analysis
units, which use Deep Neural Networks (DNN) to detect anomalies. Deep neural networks, due
to their multi-layered architecture, can effectively detect complex anomalies in large data sets,
making them ideal for this task. The use of a genetic algorithm to train DNNs allows you to
optimize model parameters, providing higher accuracy in anomaly detection. Deep Neural
Networks (DNNs)[19,20], such as Convolutional Neural Networks (CNNs)[21] and Recurrent
Neural Networks (RNNs)[22,23], are widely used to detect anomalies in large datasets. They can
automatically detect complex relationships between data parameters and identify anomalies
that may be indicative of botnet activity. The use of deep learning models, such as generative
adversarial networks (GANs)[24], can effectively find anomalies in high-dimensional data
without the need for labels.</p>
      <p>Deep neural networks have the ability to automatically detect complex dependencies and
patterns in data that are often invisible to traditional methods. Due to their multi-layered
structure, they achieve high accuracy in detecting anomalies, which significantly reduces the
number of false positives. In addition, deep neural networks can be flexibly configured and
adapted to different types of data and tasks, making them a versatile tool for analyzing large
amounts of data. They also demonstrate high efficiency in working with large data sets, which
is extremely important in modern IT infrastructures.</p>
      <p>The genetic algorithm is an effective optimization method used to tune the parameters of a
deep neural network. It is based on the principles of natural selection and genetic operations,
such as crossover, mutation, and selection. The use of a genetic algorithm for DNN training has
numerous advantages. First, it can efficiently find optimal parameter values, which ensures high
model accuracy. Secondly, thanks to the genetic algorithm, DNNs are better able to generalize
new and unpredictable data, which reduces the risk of overfitting. Finally, the genetic algorithm
allows the model to adapt to different types of data and conditions, ensuring the system's
versatility and reliability.</p>
      <p>A deep neural network consists of an input layer, several hidden layers, and an output layer.
Each layer contains a certain number of neurons that process input data and pass it to the next
layer. The input layer accepts a vector of input data</p>
      <p>= [ 1,  2, … ,   ]
where  − the number of input parameters. A neural network contains several hidden
layers, each of which calculates a weighted sum of input signals, to which a bias is added, and
then an activation function is applied. The formula for activating the neuron  of the hidden
layer looks like this:


( )</p>
      <p>( )


= 
=


 =1
( )</p>
      <p>( )
     +</p>
      <p>( )
= max (0,   ( ))
updating weights.
offset:</p>
      <p>(Rectified Linear Unit) [25] - is an activation function that is widely used in neural
networks because of its simplicity and efficiency. It is defined as:</p>
      <p>( ) = max (0,  )</p>
      <p>The main advantage of ReLU is its ability to solve the problem of gradient vanishing, which
is often encountered when using other activation functions such as sigmoid or hyperbolic
tangent[26]. When the input value is greater than zero, the ReLU function passes it on
unchanged; when the input value is less than or equal to zero, the function passes on zero. This
allows the network to learn faster and more efficiently while preserving useful gradients for
The output layer calculates the weighted sum of the hidden layer's outputs and adds the



( )

( )
=
=  

 =1

( )
 
( )
 
 −1 +</p>
      <p>( )
=</p>
      <p>1
1 +  − ( )</p>
      <p>For the initial data for training the neural network, the data from the System Configuration
block is used. This data includes IT infrastructure parameters, such as available resources,
allowed processes, amount of RAM, and types of files the system can work with. The neural
network is trained using a back-propagation algorithm that minimizes the loss function  :
where  − learning speed.</p>
      <p>After the data is processed by the Neural Network block, the results are transferred to the
Output Result block. This block is responsible for normalizing the data and sending a
notification to the system administrator if a botnet is detected.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Experiments &amp; Results</title>
      <p>To evaluate the effectiveness [27] of the developed botnet detection method, experiments were
conducted on four different types of botnets: DDoS botnets, spam botnets, data theft botnets,
and cryptocurrency mining botnets. All experiments were conducted using both real network
traffic and synthetically generated data. The system used a genetic algorithm for training, which
allowed to optimize the parameters of the neural network. To study DDoS botnets, we used a
dataset from open sources [28], such as the CAIDA DDoS Attack Dataset. The dataset contained
where   − expected output. The scales are updated using a gradient descent:
 =
1
2

 =1
(  −   )</p>
      <p>2
  
( ) ←   
( )
− 
100,000 network traffic samples, of which 70,000 were used for training and 30,000 for testing.
Additionally, 50,000 synthetic traffic samples were generated to simulate different types of
DDoS attacks with different intensities.</p>
      <p>In the case of spam botnets, real traffic from the SpamAssassin Public Corpus dataset was
used. A total of 80,000 samples were collected, of which 56,000 were used for training and 24,000
for testing. Additionally, 40,000 synthetic traffic samples were generated, including different
types of spam campaigns. For data-stealing botnets, we used data from the CERT Insider Threat
Dataset. This dataset contained 60,000 samples, of which 42,000 were used for training and
18,000 for testing. Additionally, 30,000 synthetic traffic samples were generated to simulate the
theft of sensitive data from corporate networks. For cryptocurrency mining botnets, data from
real network snapshots collected with specialized tools were used. A total of 70,000 samples
were collected, of which 49,000 were used for training and 21,000 for testing. Additionally,
35,000 synthetic traffic samples were generated to model different cryptocurrency mining
scenarios using different algorithms. The testing methodology involved dividing each dataset
into training and test subsets in a 70:30 ratio. The training subsets were used to train the neural
network, and the test subsets were used to evaluate its performance. The main metrics were
Precision, Recall, F1-score, and average Detection Time. The results of the experiment are
shown in Table 1.</p>
      <p>Table 1</p>
      <p>Results of the experiments, TP - True positive, TN - True negative, FN - False positive, FP
False negative.</p>
      <p>Epochs of
learning
1-10
10-20
20-30
30-40
40-50</p>
      <sec id="sec-4-1">
        <title>Classes of implants</title>
      </sec>
      <sec id="sec-4-2">
        <title>DDoS</title>
        <p>Spam</p>
        <p>Data Theft
Crypto Mining</p>
        <p>DDoS</p>
        <p>Spam</p>
        <p>Data Theft
Crypto Mining</p>
        <p>DDoS</p>
        <p>Spam</p>
        <p>Data Theft
Crypto Mining</p>
        <p>DDoS</p>
        <p>Spam</p>
        <p>Data Theft
Crypto Mining</p>
        <p>DDoS</p>
        <p>Spam</p>
        <p>Data Theft
Crypto Mining</p>
        <p>TP
Thus, the general metrics for analyzing the results of the experiments are shown in Table 2.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>Experimental results confirm the high efficiency of the developed botnet detection method for
all four types of botnet attacks. The method demonstrates high accuracy and memorability,
which indicates the ability to effectively recognize botnet activity in various scenarios. The
average detection time of less than one second allows the system to respond quickly to threats,
minimizing potential damage to the IT infrastructure.</p>
      <p>The use of a genetic algorithm to train the neural network ensured the optimization of
parameters and increased detection efficiency.</p>
      <p>The experimental results demonstrate the accuracy, memorability, F1-score, and detection
time for each type of botnet attack.</p>
      <p>For DDoS attacks, the method showed 96% accuracy, 94% recall, 95% F1 score, and an average
detection time of 0.8 seconds. This demonstrates the method's ability to quickly and accurately
recognize DDoS attacks, providing high risk mitigation efficiency.</p>
      <p>For spam botnets, the accuracy is 93%, the recall is 91%, the F1 score is 92%, and the average
detection time is 0.9 seconds, which confirms the method's reliability in recognizing spam bots.
In the case of data theft attacks, the accuracy reaches 95%, the recall is 92%, the F1 score is 93.5%,
and the average detection time is 1.0 seconds, which indicates the method's high ability to
effectively detect these attacks.</p>
      <p>For cryptomining botnets, the accuracy is 94%, the recall is 90%, the F1 score is 92%, and the
average detection time is 0.7 seconds, which ensures quick detection and response to
cryptomining threats.</p>
      <p>However, this method is effective if it is applied as part of the IT infrastructure security
system before it is released for public access. Since the genetic algorithm has to go through
certain epochs of training, it is important to ensure proper conditions for training the model to
correctly understand and effectively detect botnet infiltration attempts. This includes the
availability of a large amount of high-quality data for training, as well as adequate computing
power to perform complex calculations.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>The research resulted in the development of a method for detecting botnets for IT infrastructure
based on the use of neural networks and a configurator. The neural network was successfully
trained to achieve high efficiency in detecting various types of botnet attacks.</p>
      <p>The obtained quantitative indicators show that the system achieved 96% accuracy in
detecting DDoS attacks, 93% in detecting spam botnets, 95% in detecting data theft botnets, and
94% in detecting cryptocurrency mining botnets. In addition, the system demonstrates a high
detection rate with an average time of less than one second, which allows you to respond
quickly to threats and minimize potential losses.</p>
      <p>Among the limitations of the proposed method, it is worth noting that its effectiveness
largely depends on the quality and amount of data used to train the model. The genetic
algorithm requires significant computational resources to optimize the parameters of the neural
network, which can be a challenge in resource-limited environments. The method also needs to
be integrated into the IT infrastructure security system before it is released for public access to
ensure proper conditions for model training.</p>
      <p>Future research will focus on developing methods to improve the adaptability of the neural
network to new types of botnet attacks. In addition, the possibilities of reducing the computing
resources required to optimize the model parameters will be explored. Studying the application
of the proposed methodology for other types of cyber threats and integration with existing
cybersecurity systems are also important areas for further work.
[12] Y. T. Jiang, H. Wang, Challenges and Solutions in Botnet Detection Using Clustering</p>
      <p>Algorithms. International Journal of Network Security 24(2) (2022) 112-124.
[13] E. M. Cherrat, R. Alaoui, H. Bouzahir, Score fusion of finger vein and face for human
recognition based on convolutional neural network model, International Journal of
Computing, 19(1) (2020) 11-19. doi:10.47839/ijc.19.1.1688
[14] Xu, X., Y. Zheng, X. Liu, Unsupervised Botnet Detection using Network Traffic Clustering</p>
      <p>Techniques. Journal of Computer Networks and Communications 2021, 1234567, 2021.
[15] F. Haddadi, A. N. Zincir-Heywood, Botnet detection using network flow analysis and
support vector machines. Computer Networks 181 (2020) 107543.
[16] S. Lysenko, O. Savenko, K. Bobrovnikova, DDoS Botnet Detection Technique Based on the</p>
      <p>Use of the Semi-Supervised Fuzzy c-Means Clustering. CEUR-WS 2104 (2018) 688-695.
[17] B. Savenko, S. Lysenko, K. Bobrovnikova, O. Savenko, G. Markowsky, Detection DNS
Tunneling Botnets, 11th IEEE International Conference on Intelligent Data Acquisition and
Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland,
pp. 64-69, 2021.
[18] S. O. Tika, A. Budiono. Impact analysis of malware based on call network API with heuristic
detection method. International Journal of Advances in Data and Information Systems 1
(2020) 1-8.
[19] Z. Y. Liu, X. Luo. Deep learning for botnet detection: A survey. IEEE Access 9, 82771-82785,
2021.
[20] M. Ribeiro, M. Vieira, Deep Learning Clustering for Botnet Detection. Cybersecurity and</p>
      <p>Privacy Journal 1, no. 1, (2020). 45-60.
[21] D.J. Vincent, V. S.Hari, H.V.S., Classification of Letter Images from Scanned Invoices using</p>
      <p>CNN. International Journal of Computing 22.3, 2023
[22] Sherstinsky, A. Fundamentals of recurrent neural network (RNN) and long short-term
memory (LSTM) network. Physica D: Nonlinear Phenomena, 404, 132306, 2020.
[23] A. Lerke, H. Heßling, On Strange Memory Effects in Long–term Forecasts using</p>
      <p>Regularised Recurrent Neural Networks. IJC 21, no. 1, 2022.
[24] S. Balaji, S. S. Narayanan, Hybrid Deep-GAN Model for Intrusion Detection in IoT Through</p>
      <p>Enhanced Whale Optimization. International Journal of Computing 21.4, 456-467, 2022.
[25] Y. Yu, K. Adu, N. Tashi, P. Anokye, X. Wang, M. A. Ayidzoe, RMAF: Relu-Memristor-Like</p>
      <p>Activation Function for Deep Learning, IEEE Access, vol. 8, pp. 72727-72741, 2020.
[26] F. M. Shakiba, M. Z. MengChu, Novel analog implementation of a hyperbolic tangent
neuron in artificial neural networks. IEEE Transactions on Industrial Electronics, vol. 68,
no. 11, pp. 10856-10867, Nov. 2021.
[27] B. Savenko, A. Kashtalian, Method for Determining the Efficiency of a Distributed</p>
      <p>Anomaly Detection System. CSIT 2, 14-22, 2022.
[28] M. Moshkovitz, et al. Explainable k-means and k-medians clustering. International
Conference on Machine Learning. PMLR, pp. 7055-7065, 2020.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kumar</surname>
          </string-name>
          et al.,
          <article-title>Machine learning-based early detection of IoT botnets using network-edge traffic</article-title>
          .
          <source>Computers &amp; Security</source>
          <volume>117</volume>
          (
          <year>2022</year>
          )
          <fpage>102693</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Brooks</surname>
          </string-name>
          et al.
          <article-title>Distributed denial of service (DDoS): a history</article-title>
          .
          <source>IEEE Annals of the History of Computing 44, no. 2</source>
          ,
          <fpage>44</fpage>
          -
          <lpage>54</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J. C. P.</given-names>
            <surname>Zschech</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Heinrich</surname>
          </string-name>
          ,
          <article-title>Machine learning and deep learning</article-title>
          .
          <source>Electronic Markets</source>
          <volume>31</volume>
          , no.
          <issue>3</issue>
          ,
          <fpage>685</fpage>
          -
          <lpage>695</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>H.</given-names>
            <surname>Yizeng</surname>
          </string-name>
          , et al.
          <article-title>Dynamic neural networks: A survey</article-title>
          .
          <source>IEEE Transactions on Pattern Analysis and Machine Intelligence</source>
          <volume>44</volume>
          , no.
          <volume>11</volume>
          ,
          <fpage>7436</fpage>
          -
          <lpage>7456</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.S.</given-names>
            <surname>Narasimha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Kota</surname>
          </string-name>
          ,
          <article-title>An empirical study on system level aspects of Internet of Things (IoT)</article-title>
          .
          <source>IEEE Access 8</source>
          ,
          <fpage>188082</fpage>
          -
          <lpage>188134</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Denysiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kashtalian</surname>
          </string-name>
          ,
          <article-title>Method for Detecting Steganographic Changes in Images Using Machine Learning</article-title>
          .
          <source>2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Athens, Greece, pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F5</given-names>
            <surname>Labs</surname>
          </string-name>
          .
          <article-title>"H1 2023 Bad Bots Review." URL: https://www</article-title>
          .f5.com/labs/articles/threatintelligence/monthly-bot
          <article-title>-stats-</article-title>
          <string-name>
            <surname>report-</surname>
          </string-name>
          h1-
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Spamhaus</surname>
          </string-name>
          .
          <article-title>"Botnet Threat Updates." URL: https://info</article-title>
          .spamhaus.com/botnet-threatupdates.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ömer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Samet</surname>
          </string-name>
          ,
          <article-title>A comprehensive review on malware detection approaches</article-title>
          .
          <source>IEEE Access</source>
          <volume>8</volume>
          (
          <year>2020</year>
          )
          <fpage>6249</fpage>
          -
          <lpage>6271</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>G.</given-names>
            <surname>Markowsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nicheporuk</surname>
          </string-name>
          ,
          <article-title>The technique for metamorphic viruses' detection based on its obfuscation features analysis</article-title>
          .
          <source>CEUR-WS 2104</source>
          ,
          <fpage>680</fpage>
          -
          <lpage>687</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Qiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khandelwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Performance evaluation of hybrid WOA-XGBoost, GWO-XGBoost and BO-XGBoost models to predict blast-induced ground vibration</article-title>
          .
          <source>Engineering with Computers</source>
          , (
          <year>2022</year>
          )
          <fpage>4145</fpage>
          -
          <lpage>4162</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>