=Paper= {{Paper |id=Vol-3736/paper21 |storemode=property |title=A method for detecting botnets in IT infrastructure using a neural network |pdfUrl=https://ceur-ws.org/Vol-3736/paper21.pdf |volume=Vol-3736 |authors=Dmytro Denysiuk,Tomas Sochor,Mariia Kapustian,Antonina Kashtalian,Andriy Drozd |dblpUrl=https://dblp.org/rec/conf/icyberphys/DenysiukSKKD24 }} ==A method for detecting botnets in IT infrastructure using a neural network== https://ceur-ws.org/Vol-3736/paper21.pdf
                                A method for detecting botnets in IT infrastructure
                                using a neural network

                                Dmytro Denysiuk1,*,†, Tomas Sochor2,†, Mariia Kapustian1,†, Antonina Kashtalian1,† and
                                Andriy Drozd1,†
                                1 Khmelnytskyi National University, Institutska str., 11, Khmelnytskyi, 29016, Ukraine
                                2 Prigo University College European Research University Vítězslava Nezvala 801/1 736 01 Havířov Czech Republic
                                European Union



                                                Abstract
                                                Information technology has become an integral part of modern life, but with this come new cyber
                                                threats. One of them is botnets—networks of infected computers that criminals use for DDoS attacks,
                                                data theft, and spam distribution. Traditional detection methods, such as signature analysis and rule-
                                                based approaches, often fail to handle these threats, necessitating the implementation of advanced
                                                methods. This article presents a botnet detection method in IT infrastructure based on the use of
                                                neural networks. The proposed approach involves creating a baseline configuration of the IT
                                                infrastructure by a system administrator for further training of neural networks to detect botnet
                                                attacks. Experiments conducted on four types of botnets (DDoS, spam, data theft, and cryptocurrency
                                                mining) demonstrated high accuracy and efficiency of the system. The method achieved 96% accuracy
                                                in detecting DDoS attacks, 93% in detecting spam botnets, 95% in detecting data theft botnets, and
                                                94% in detecting cryptocurrency mining botnets. The use of a genetic algorithm for training neural
                                                networks improved detection efficiency. The method demonstrates high detection speed, with an
                                                average time of less than one second. Thus, the developed method is an effective tool for ensuring
                                                the security of IT infrastructure, confirming the relevance of using neural networks and machine
                                                learning for cybersecurity. Further research is aimed at improving the adaptability of neural networks
                                                and reducing the computational resources required for model parameter optimization.

                                                Keywords
                                                 1botnet, neural networks, cybersecurity, it infrastructure, anomaly detection, ddos attacks, threat
                                classification, machine learning, traffic analysis, genetic algorithm



                                1. Introduction
                                In the modern world, information technology is an integral part of both personal life and the
                                functioning of organizations. The widespread use of Internet-connected devices has
                                significantly increased productivity, communication, and process automation. However, these


                                ICyberPhyS-2024: 1st International Workshop on Intelligent & CyberPhysical Systems, June 28, 2024, Khmelnytskyi,
                                Ukraine
                                ∗ Corresponding author.
                                † These authors contributed equally.
                                   denysiuk@khmnu.edu.ua (D. Denysiuk); tomas.sochor@osu.cz (T. Sochor); kapustian.mariia@gmail.com (M.
                                Kapustian); yantonina@ukr.net (A. Kashtalian); andriydrozdit@gmail.com (A. Drozd);
                                    0000-0002-7345-8341 (D. Denysiuk); 0000-0002-1704-1883 (T. Sochor); 0000-0001-9200-1622 (M. Kapustian);
                                0000-0002-4925-9713 (A. Kashtalian); 0009-0008-1049-1911(A. Drozd);
                                           © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).




CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings
advancements are accompanied by a rise in threats, among which botnets [1] stand out —
networks of computers infected with malicious software controlled by attackers to carry out
criminal activities.
    Botnets can be used for various criminal activities, such as distributed denial-of-service
(DDoS) attacks [2], theft of confidential data, spam distribution, and financial fraud. They are
particularly dangerous due to their ability to scale attacks using a large number of infected
devices. With the advancement of technology and the increasing complexity of botnets,
traditional detection methods, such as signature analysis and rule-based methods, often fail to
cope with modern threats.
    In 2023, there was a significant increase in botnet activity. According to F5 Labs [7], the
number of automated attacks on mobile APIs across various industries rose in the first half of
2023. For example, the entertainment industry became the most targeted, with over a quarter
of all traffic to mobile APIs being automated by attackers. In June 2023, the level of automated
attacks in this industry reached 45.5%. According to a report by Spamhaus [8], the number of
command and control (C&C) servers for botnets increased by 16% in the fourth quarter of 2023.
The most significant growth was observed in countries like China and the USA, with a notable
surge in Bulgaria. This underscores the global nature of the threat, which is not confined to any
specific geographic area. The report also noted a 23% increase in new C&C servers for botnets
in the first quarter of 2023. Major threats remain Cobalt Strike and Quakbot, which continue to
dominate the botnet landscape.
    It is worth noting that a significant portion of botnets is aimed at spreading through IT
infrastructure. Cybercriminals employ various methods to distribute malicious software [9],
including websites and IT infrastructure servers. Their goal is to infect as many devices as
possible, utilizing their computing resources for further criminal activities. For instance, servers
infected with malware can be used to launch large-scale attacks, such as distributed denial-of-
service (DDoS) attacks, or to carry out financial fraud.
    Modern botnets have become much more sophisticated, using advanced obfuscation
techniques and masking their presence, making detection by traditional methods a significantly
more challenging task. To combat such threats, it is necessary to employ advanced methods of
system behavior and anomaly analysis, which can effectively detect suspicious activity even in
well-protected environments.
    The aim of this study is to develop a method for detecting and preventing the spread of
botnet networks using machine learning technologies. One of the tasks is to investigate modern
methods for detecting botnets, particularly those based on system behavior analysis [10]. The
advantages and disadvantages of existing detection methods and their ability to adapt to new
threats are considered.
    The research makes an important contribution to the field of cybersecurity by providing a
comprehensive analysis of modern threats related to botnets, including a review of the latest
trends and attack methods. It also evaluates the effectiveness of both traditional and
contemporary botnet detection methods, highlighting the need to implement cutting-edge
technologies to ensure robust protection. One of the key contributions is the development of a
new method for detecting botnets using neural networks, which significantly enhances the
ability of systems to detect and prevent anomalies in network traffic.
2. Literature review
Modern botnet detection methods have a number of advantages and disadvantages that should
be considered when designing and implementing cybersecurity systems. machine learning-
based methods include their ability to analyze large amounts of data and identify complex
patterns that may indicate botnet activity. For example, XGBoost algorithms[11] and neural
networks can achieve high accuracy in classifying[12] malicious and legitimate activities.
Machine learning allows systems to self-learn and improve their results over time, which is a
great advantage in the face of ever-changing threats[13].
     Network traffic analysis[14,15] is another strong point of modern methods, as it allows for
real-time detection of anomalies, which can help to respond quickly to attacks. This approach
is especially useful for detecting DDoS attacks[16], which are characterized by a high volume
of the same type of traffic[17].
     However, these methods have their drawbacks. One of the main challenges is the need for
large and high-quality data sets to train machine learning models. Most existing models perform
well only on the data sets they were trained on, which limits their ability to adapt to new types
of attacks. In addition, machine learning algorithms can be vulnerable to overtraining, where
models perform well on training data but poorly on new, unforeseen data.
     Hybrid methods that combine different techniques can be difficult to implement and require
significant computing resources. Such systems may be less effective in the case of low-
performance devices, as is often the case in IoT networks.
     Behavioral analysis[18], while effective in detecting atypical patterns, can cause many false
positives, especially in complex and dynamic network environments. These false positives can
overwhelm the cybersecurity system and require additional resources to process them.
     Thus, modern botnet detection methods are powerful tools, but their effective use requires
careful customization and adaptation to specific network conditions. Further research will focus
on developing a method for detecting botnets in IT infrastructures. This will make it possible
to detect a botnet not only when it executes commands, but also at the stage of its distribution
and receipt of commands from external resources

3. Methodology of research
In order to develop an effective botnet detection method, it is necessary to first determine which
IT infrastructure it will be used in.
    Since the Internet is constantly evolving and users visit numerous websites, the number of
IT infrastructures serving these sites is constantly increasing.
    At the same time, it should be borne in mind that these infrastructures are at risk because
they can potentially be carriers of botnet codes. Accordingly, the botnet detection method will
be aimed at protecting the IT infrastructure of web portals.
    Figure 1 shows a block diagram of the method of detecting a botnet in the IT infrastructure
of a web service. It consists of several components.
           Figure 1: Structural diagram of the method of detecting botnet-networks

    The system configuration unit plays a key role in determining the initial parameters of the
IT infrastructure. It is configured by the network administrator and includes important data
specific to the infrastructure.
    The network administrator determines what resources are available for use by the
infrastructure, what processes can be run, what amounts of RAM are required for its
functioning, and what operations can be performed with what types of files.
    This block sets the initial parameters for training a neural network designed to detect
botnets. In particular, it provides the neural network with the necessary initial data for training,
which allows it to adapt to the specific conditions and requirements of a given IT infrastructure.
    The system configuration block can be represented as a set of parameters that define the
initial settings of the IT infrastructure. Let 𝐶𝐶 − a set of system configuration parameters that
includes the following elements:
                                          𝐶𝐶 = {𝑅𝑅, 𝑃𝑃, 𝑀𝑀, 𝐹𝐹}

where 𝑅𝑅 − is a set of resources available for use by the infrastructure, 𝑃𝑃 − a set of processes
that can be run in the infrastructure, 𝑀𝑀 − the amount of RAM required for the system to
function, 𝐹𝐹 − a set of operations with file types that can be performed within the infrastructure.
    The determination of available resources includes accounting for server computing power,
storage capacity, and network bandwidth.
    The administrator also determines the permissible processes and services that can be run on
the servers, which helps to avoid running unauthorized or malicious programs. In addition,
configuring the amount of RAM is an important aspect, as it affects system performance and its
ability to process large amounts of data in real time. Correctly determining the amount of RAM
allows you to avoid system overload and ensure stable operation. Each of these elements can
be described in detail as follows:
                                           𝑅𝑅 = {𝑟𝑟1 , 𝑟𝑟2 , … , 𝑟𝑟𝑛𝑛 }

   where 𝑟𝑟𝑖𝑖 − represents a single resource, such as server computing power, network
bandwidth, etc. The set of processes can be described as follows:

                                          𝑃𝑃 = {𝑝𝑝1 , 𝑝𝑝2 , … , 𝑝𝑝𝑚𝑚 }

  where 𝑝𝑝𝑖𝑖 − an acceptable process or service that can be run in the infrastructure. The
amount of RAM can be designated as:
                             𝑀𝑀 = 𝑅𝑅𝑅𝑅𝑅𝑅𝑚𝑚𝑚𝑚𝑚𝑚 ≤ 𝑀𝑀 ≤ 𝑅𝑅𝑅𝑅𝑅𝑅𝑚𝑚𝑚𝑚𝑚𝑚

where 𝑅𝑅𝑅𝑅𝑅𝑅𝑚𝑚𝑚𝑚𝑚𝑚 , 𝑅𝑅𝑅𝑅𝑅𝑅𝑚𝑚𝑚𝑚𝑚𝑚 − minus the minimum and maximum amounts of RAM required for
stable system operation.
   File and file type operations are also important aspects of configuration. The network
administrator determines what types of files can be processed, stored, or transmitted over the
network, which allows you to control data flows and prevent the spread of malware. File
operations can be described as follows:

                               𝐹𝐹 = {(𝑡𝑡1 , 𝑜𝑜1 ), (𝑡𝑡2 , 𝑜𝑜2 ), … , (𝑡𝑡𝑘𝑘 , 𝑜𝑜𝑘𝑘 )}

    where 𝑡𝑡𝑖𝑖 − file type, 𝑜𝑜𝑖𝑖 − an operation that can be performed on a file of this type (read,
write, delete, etc.).
    Thus, the system configuration block configures the main parameters of the IT infrastructure
necessary for its uninterrupted operation and effective protection against threats. This is the
foundation for further implementation and use of botnet detection methods within web
services.
    The System Monitor block plays a key role in collecting and structuring the data required
for monitoring and analyzing the IT infrastructure. Its main function is to ensure the security
and stability of the system by providing up-to-date information about the status of resources
and network activity.
    System Monitor collects data on resource utilization, including server processing power,
network bandwidth, and other critical components. This process involves monitoring metrics
such as CPU utilization, disk space utilization, and network traffic. Information about resource
utilization allows you to identify anomalies that may indicate the presence of botnet activity.
    In addition, System Monitor monitors running processes, collecting data on all active tasks
and services. This includes information about process identifiers, their execution time, resource
usage by each process, and their interaction with other system components. Analyzing this data
helps to identify unauthorized or malicious processes that may be part of a botnet.
    Control over the use of RAM is also included in the System Monitor functions. This involves
collecting data on current memory usage, memory allocation between processes, and detecting
potential memory leaks. Monitoring the use of RAM is critical to ensuring efficient system
operation and preventing overloading. In addition, System Monitor monitors file operations,
collecting data on file creation, modification, deletion, and access. Information about file
operations allows you to detect suspicious activity, such as unauthorized changes to system
files or mass deletion of data, which can be signs of a botnet attack.
    The collected data is structured and stored in the form of logs and other formats, which
allows for further analysis and processing. Based on this data, machine learning models can be
developed to detect anomalies and predict potential threats. Thus, System Monitor provides the
basis for detecting botnets and protecting IT infrastructure from malicious activity, helping to
increase the level of security and reliability of the system.
    After receiving data from the System Monitor unit, the data is processed in the analysis
units, which use Deep Neural Networks (DNN) to detect anomalies. Deep neural networks, due
to their multi-layered architecture, can effectively detect complex anomalies in large data sets,
making them ideal for this task. The use of a genetic algorithm to train DNNs allows you to
optimize model parameters, providing higher accuracy in anomaly detection. Deep Neural
Networks (DNNs)[19,20], such as Convolutional Neural Networks (CNNs)[21] and Recurrent
Neural Networks (RNNs)[22,23], are widely used to detect anomalies in large datasets. They can
automatically detect complex relationships between data parameters and identify anomalies
that may be indicative of botnet activity. The use of deep learning models, such as generative
adversarial networks (GANs)[24], can effectively find anomalies in high-dimensional data
without the need for labels.
    Deep neural networks have the ability to automatically detect complex dependencies and
patterns in data that are often invisible to traditional methods. Due to their multi-layered
structure, they achieve high accuracy in detecting anomalies, which significantly reduces the
number of false positives. In addition, deep neural networks can be flexibly configured and
adapted to different types of data and tasks, making them a versatile tool for analyzing large
amounts of data. They also demonstrate high efficiency in working with large data sets, which
is extremely important in modern IT infrastructures.
    The genetic algorithm is an effective optimization method used to tune the parameters of a
deep neural network. It is based on the principles of natural selection and genetic operations,
such as crossover, mutation, and selection. The use of a genetic algorithm for DNN training has
numerous advantages. First, it can efficiently find optimal parameter values, which ensures high
model accuracy. Secondly, thanks to the genetic algorithm, DNNs are better able to generalize
new and unpredictable data, which reduces the risk of overfitting. Finally, the genetic algorithm
allows the model to adapt to different types of data and conditions, ensuring the system's
versatility and reliability.
    A deep neural network consists of an input layer, several hidden layers, and an output layer.
Each layer contains a certain number of neurons that process input data and pass it to the next
layer. The input layer accepts a vector of input data

                                            𝑋𝑋 = [𝑥𝑥1 , 𝑥𝑥2 , … , 𝑥𝑥𝑛𝑛 ]

   where 𝑛𝑛 − the number of input parameters. A neural network contains several hidden
layers, each of which calculates a weighted sum of input signals, to which a bias is added, and
then an activation function is applied. The formula for activating the neuron 𝑗𝑗 of the hidden
layer looks like this:
                                                     𝑛𝑛
                                     (𝑙𝑙)                    (𝑙𝑙)          (𝑙𝑙)
                                   𝑧𝑧𝑗𝑗     =�            𝜔𝜔𝑗𝑗𝑗𝑗 𝑥𝑥𝑖𝑖 + 𝑏𝑏𝑖𝑖
                                               𝑖𝑖=1
                                 (𝑙𝑙)             (𝑙𝑙)             (𝑙𝑙)
                              𝑎𝑎𝑗𝑗 = 𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅 �𝑧𝑧𝑗𝑗 � = max (0, 𝑧𝑧𝑗𝑗 )
   𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅 (Rectified Linear Unit) [25] - is an activation function that is widely used in neural
networks because of its simplicity and efficiency. It is defined as:
                                      𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅(𝑥𝑥) = max (0, 𝑥𝑥)

    The main advantage of ReLU is its ability to solve the problem of gradient vanishing, which
is often encountered when using other activation functions such as sigmoid or hyperbolic
tangent[26]. When the input value is greater than zero, the ReLU function passes it on
unchanged; when the input value is less than or equal to zero, the function passes on zero. This
allows the network to learn faster and more efficiently while preserving useful gradients for
updating weights.
    The output layer calculates the weighted sum of the hidden layer's outputs and adds the
offset:

                                                 𝑚𝑚
                                  (𝐿𝐿)                       (𝐿𝐿)                 (𝐿𝐿)
                                 𝑧𝑧𝑘𝑘 = �               𝜔𝜔𝑘𝑘𝑘𝑘 𝑎𝑎𝑗𝑗𝐿𝐿−1 + 𝑏𝑏𝑘𝑘
                                                 𝑖𝑖=1
                                   (𝐿𝐿)               (𝐿𝐿)                1
                                  𝑎𝑎𝑘𝑘 = 𝜎𝜎 �𝑧𝑧𝑘𝑘 � =                             (𝐿𝐿)
                                                                    1 + 𝑒𝑒 −𝑧𝑧𝑘𝑘

    For the initial data for training the neural network, the data from the System Configuration
block is used. This data includes IT infrastructure parameters, such as available resources,
allowed processes, amount of RAM, and types of files the system can work with. The neural
network is trained using a back-propagation algorithm that minimizes the loss function 𝐿𝐿:

                                        1 𝑝𝑝
                                    𝐿𝐿 = � (𝑦𝑦𝑘𝑘 − 𝑦𝑦�𝑘𝑘 )2
                                        2 𝑘𝑘=1

where 𝑦𝑦�𝑘𝑘 − expected output. The scales are updated using a gradient descent:

                                          (𝑗𝑗)         (𝑗𝑗)            𝜗𝜗𝜗𝜗
                                     𝜔𝜔𝑗𝑗𝑗𝑗 ← 𝜔𝜔𝑗𝑗𝑗𝑗 − 𝜂𝜂                  (𝑗𝑗)
                                                                     𝜗𝜗𝜗𝜗𝑗𝑗𝑗𝑗

   where 𝜗𝜗 − learning speed.
    After the data is processed by the Neural Network block, the results are transferred to the
Output Result block. This block is responsible for normalizing the data and sending a
notification to the system administrator if a botnet is detected.

4. Experiments & Results
To evaluate the effectiveness [27] of the developed botnet detection method, experiments were
conducted on four different types of botnets: DDoS botnets, spam botnets, data theft botnets,
and cryptocurrency mining botnets. All experiments were conducted using both real network
traffic and synthetically generated data. The system used a genetic algorithm for training, which
allowed to optimize the parameters of the neural network. To study DDoS botnets, we used a
dataset from open sources [28], such as the CAIDA DDoS Attack Dataset. The dataset contained
100,000 network traffic samples, of which 70,000 were used for training and 30,000 for testing.
Additionally, 50,000 synthetic traffic samples were generated to simulate different types of
DDoS attacks with different intensities.
   In the case of spam botnets, real traffic from the SpamAssassin Public Corpus dataset was
used. A total of 80,000 samples were collected, of which 56,000 were used for training and 24,000
for testing. Additionally, 40,000 synthetic traffic samples were generated, including different
types of spam campaigns. For data-stealing botnets, we used data from the CERT Insider Threat
Dataset. This dataset contained 60,000 samples, of which 42,000 were used for training and
18,000 for testing. Additionally, 30,000 synthetic traffic samples were generated to simulate the
theft of sensitive data from corporate networks. For cryptocurrency mining botnets, data from
real network snapshots collected with specialized tools were used. A total of 70,000 samples
were collected, of which 49,000 were used for training and 21,000 for testing. Additionally,
35,000 synthetic traffic samples were generated to model different cryptocurrency mining
scenarios using different algorithms. The testing methodology involved dividing each dataset
into training and test subsets in a 70:30 ratio. The training subsets were used to train the neural
network, and the test subsets were used to evaluate its performance. The main metrics were
Precision, Recall, F1-score, and average Detection Time. The results of the experiment are
shown in Table 1.
   Table 1
   Results of the experiments, TP - True positive, TN - True negative, FN - False positive, FP -
False negative.
    Epochs of        Classes of implants      TP        TN         FN       FP       Overall
     learning                                                                      accuracy, %
       1-10                DDoS              1200      1100       1000     900       53.75%
                           Spam              1150      1050        980     950       55.00%
                         Data Theft          1250      1150       1050     850       58.75%
                       Crypto Mining         1300      1200       1000     800       60.00%
       10-20               DDoS              1400      1300        700     600       67.50%
                           Spam              1350      1250        750     650       65.00%
                         Data Theft          1450      1350        650     550       70.00%
                       Crypto Mining         1500      1400        600     500       72.50%
       20-30               DDoS              1600      1500        500     400       77.50%
                           Spam              1550      1450        550     450       75.00%
                         Data Theft          1650      1550        450     350       80.00%
                       Crypto Mining         1700      1600        400     300       82.50%
       30-40               DDoS              1800      1700        300     200       87.50%
                           Spam              1750      1650        350     250       85.00%
                         Data Theft          1850      1750        250     150       90.00%
                       Crypto Mining         1900      1800        200     100       92.50%
       40-50               DDoS              2000      1900        100      0        97.50%
                           Spam              2050      1950        50       50       98.00%
                         Data Theft          2050      1950        50       50       98.00%
                       Crypto Mining         2070      1930        30       40       99.00%
   Thus, the general metrics for analyzing the results of the experiments are shown in Table 2.

   Table 2

    Botnet Type           Precision       Recall          F1-score    Detection Time (seconds)
       DDoS                 96%           94%             95%                0.8
       Spam                 93%           91%             92%                0.9
     Data Theft             95%           92%             93.5%              1.0
   Crypto Mining            94%           90%             92%                0.7

5. Discussion
Experimental results confirm the high efficiency of the developed botnet detection method for
all four types of botnet attacks. The method demonstrates high accuracy and memorability,
which indicates the ability to effectively recognize botnet activity in various scenarios. The
average detection time of less than one second allows the system to respond quickly to threats,
minimizing potential damage to the IT infrastructure.
    The use of a genetic algorithm to train the neural network ensured the optimization of
parameters and increased detection efficiency.
    The experimental results demonstrate the accuracy, memorability, F1-score, and detection
time for each type of botnet attack.
    For DDoS attacks, the method showed 96% accuracy, 94% recall, 95% F1 score, and an average
detection time of 0.8 seconds. This demonstrates the method's ability to quickly and accurately
recognize DDoS attacks, providing high risk mitigation efficiency.
    For spam botnets, the accuracy is 93%, the recall is 91%, the F1 score is 92%, and the average
detection time is 0.9 seconds, which confirms the method's reliability in recognizing spam bots.
In the case of data theft attacks, the accuracy reaches 95%, the recall is 92%, the F1 score is 93.5%,
and the average detection time is 1.0 seconds, which indicates the method's high ability to
effectively detect these attacks.
    For cryptomining botnets, the accuracy is 94%, the recall is 90%, the F1 score is 92%, and the
average detection time is 0.7 seconds, which ensures quick detection and response to
cryptomining threats.
    However, this method is effective if it is applied as part of the IT infrastructure security
system before it is released for public access. Since the genetic algorithm has to go through
certain epochs of training, it is important to ensure proper conditions for training the model to
correctly understand and effectively detect botnet infiltration attempts. This includes the
availability of a large amount of high-quality data for training, as well as adequate computing
power to perform complex calculations.

6. Conclusions
The research resulted in the development of a method for detecting botnets for IT infrastructure
based on the use of neural networks and a configurator. The neural network was successfully
trained to achieve high efficiency in detecting various types of botnet attacks.
   The obtained quantitative indicators show that the system achieved 96% accuracy in
detecting DDoS attacks, 93% in detecting spam botnets, 95% in detecting data theft botnets, and
94% in detecting cryptocurrency mining botnets. In addition, the system demonstrates a high
detection rate with an average time of less than one second, which allows you to respond
quickly to threats and minimize potential losses.
   Among the limitations of the proposed method, it is worth noting that its effectiveness
largely depends on the quality and amount of data used to train the model. The genetic
algorithm requires significant computational resources to optimize the parameters of the neural
network, which can be a challenge in resource-limited environments. The method also needs to
be integrated into the IT infrastructure security system before it is released for public access to
ensure proper conditions for model training.
   Future research will focus on developing methods to improve the adaptability of the neural
network to new types of botnet attacks. In addition, the possibilities of reducing the computing
resources required to optimize the model parameters will be explored. Studying the application
of the proposed methodology for other types of cyber threats and integration with existing
cybersecurity systems are also important areas for further work.

References
[1] A. Kumar et al., Machine learning-based early detection of IoT botnets using network-edge
     traffic. Computers & Security 117 (2022) 102693.
[2] R. R. Brooks et al. Distributed denial of service (DDoS): a history. IEEE Annals of the
     History of Computing 44, no. 2, 44-54, 2021.
[3] J. C. P. Zschech, K. Heinrich, Machine learning and deep learning. Electronic Markets 31,
     no. 3, 685-695, 2021.
[4] H. Yizeng, et al. Dynamic neural networks: A survey. IEEE Transactions on Pattern
     Analysis and Machine Intelligence 44, no. 11, 7436-7456, 2021.
[5] S.S. Narasimha, S. R. Kota, An empirical study on system level aspects of Internet of Things
     (IoT). IEEE Access 8, 188082-188134, 2020.
[6] D. Denysiuk, O. Savenko, S. Lysenko, B. Savenko, A. Kashtalian, Method for Detecting
     Steganographic Changes in Images Using Machine Learning. 2023 13th International
     Conference on Dependable Systems, Services and Technologies (DESSERT), Athens,
     Greece, pp. 1-6, 2023.
[7] F5 Labs. "H1 2023 Bad Bots Review." URL: https://www.f5.com/labs/articles/threat-
     intelligence/monthly-bot-stats-report-h1-2023.
[8] Spamhaus. "Botnet Threat Updates." URL: https://info.spamhaus.com/botnet-threat-
     updates.
[9] A. Ömer, R. Samet, A comprehensive review on malware detection approaches. IEEE
     Access 8 (2020) 6249-6271.
[10] G. Markowsky, O. Savenko, S. Lysenko, A. Nicheporuk, The technique for metamorphic
     viruses' detection based on its obfuscation features analysis. CEUR-WS 2104, 680-687, 2018.
[11] Y.Qiu, J.Zhou, M. Khandelwal, H.Yang, P.Yang, C. Li, Performance evaluation of hybrid
     WOA-XGBoost, GWO-XGBoost and BO-XGBoost models to predict blast-induced ground
     vibration. Engineering with Computers, (2022)4145-4162.
[12] Y. T. Jiang, H. Wang, Challenges and Solutions in Botnet Detection Using Clustering
     Algorithms. International Journal of Network Security 24(2) (2022) 112-124.
[13] E. M. Cherrat, R. Alaoui, H. Bouzahir, Score fusion of finger vein and face for human
     recognition based on convolutional neural network model, International Journal of
     Computing, 19(1) (2020) 11-19. doi:10.47839/ijc.19.1.1688
[14] Xu, X., Y. Zheng, X. Liu, Unsupervised Botnet Detection using Network Traffic Clustering
     Techniques. Journal of Computer Networks and Communications 2021, 1234567, 2021.
[15] F. Haddadi, A. N. Zincir-Heywood, Botnet detection using network flow analysis and
     support vector machines. Computer Networks 181 (2020) 107543.
[16] S. Lysenko, O. Savenko, K. Bobrovnikova, DDoS Botnet Detection Technique Based on the
     Use of the Semi-Supervised Fuzzy c-Means Clustering. CEUR-WS 2104 (2018) 688-695.
[17] B. Savenko, S. Lysenko, K. Bobrovnikova, O. Savenko, G. Markowsky, Detection DNS
     Tunneling Botnets, 11th IEEE International Conference on Intelligent Data Acquisition and
     Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland,
     pp. 64-69, 2021.
[18] S. O. Tika, A. Budiono. Impact analysis of malware based on call network API with heuristic
     detection method. International Journal of Advances in Data and Information Systems 1
     (2020) 1-8.
[19] Z. Y. Liu, X. Luo. Deep learning for botnet detection: A survey. IEEE Access 9, 82771-82785,
     2021.
[20] M. Ribeiro, M. Vieira, Deep Learning Clustering for Botnet Detection. Cybersecurity and
     Privacy Journal 1, no. 1, (2020). 45-60.
[21] D.J. Vincent, V. S.Hari, H.V.S., Classification of Letter Images from Scanned Invoices using
     CNN. International Journal of Computing 22.3, 2023
[22] Sherstinsky, A. Fundamentals of recurrent neural network (RNN) and long short-term
     memory (LSTM) network. Physica D: Nonlinear Phenomena, 404, 132306, 2020.
[23] A. Lerke, H. Heßling, On Strange Memory Effects in Long–term Forecasts using
     Regularised Recurrent Neural Networks. IJC 21, no. 1, 2022.
[24] S. Balaji, S. S. Narayanan, Hybrid Deep-GAN Model for Intrusion Detection in IoT Through
     Enhanced Whale Optimization. International Journal of Computing 21.4, 456-467, 2022.
[25] Y. Yu, K. Adu, N. Tashi, P. Anokye, X. Wang, M. A. Ayidzoe, RMAF: Relu-Memristor-Like
     Activation Function for Deep Learning, IEEE Access, vol. 8, pp. 72727-72741, 2020.
[26] F. M. Shakiba, M. Z. MengChu, Novel analog implementation of a hyperbolic tangent
     neuron in artificial neural networks. IEEE Transactions on Industrial Electronics, vol. 68,
     no. 11, pp. 10856-10867, Nov. 2021.
[27] B. Savenko, A. Kashtalian, Method for Determining the Efficiency of a Distributed
     Anomaly Detection System. CSIT 2, 14-22, 2022.
[28] M. Moshkovitz, et al. Explainable k-means and k-medians clustering. International
     Conference on Machine Learning. PMLR, pp. 7055-7065, 2020.