Machine Learning-Based Approach for Real-Time Detection of Botnet Activities within Wireless Network Infrastructures

Authors

Okafor Adanna P

Department of Computer Science, Enugu State University of Science and Technology (Nigeria.)

Asogwa T.C.

Department of Computer Science, Enugu State University of Science and Technology (Nigeria.)

Article Information

DOI: 10.51244/IJRSI.2025.12110189

Subject Category: Computer Science

Volume/Issue: 12/11 | Page No: 2181-2194

Publication Timeline

Submitted: 2025-11-21

Accepted: 2025-11-29

Published: 2025-12-09

Abstract

In recent years, botnet attacks have emerged as one of the most prevalent and sophisticated cybersecurity threats, exploiting network vulnerabilities to compromise system integrity, confidentiality, and availability. Traditional security mechanisms, such as signature-based intrusion detection systems, struggle to keep pace with the dynamic and evolving nature of these threats. This study presents a machine learning-based approach for real-time detection of botnet activities within wireless network infrastructures. Using the Kaggle Malware Traffic Analysis Knowledge Dataset (MTA-KDD’19) and the dataset underwent preprocessing procedures including data cleaning, normalization, transformation, and class balancing using SMOTE. Three machine learning algorithms such as Decision Tree, Random Forest, and Artificial Neural Network (ANN) which were implemented and evaluated based on accuracy, precision, recall, and F1-score where the experimental results revealed that the Random Forest classifier achieved the highest performance accuracy of 99.93%, outperforming the Decision Tree and Neural Network models. The findings demonstrate that Random Forest provides superior generalization and robustness in classifying malicious and benign network traffic. The study concludes that machine learning models, particularly ensemble methods, can significantly enhance proactive threat detection and serve as a foundation for real-time cyber defence systems against botnet attacks.

Keywords

Botnet Detection; Machine Learning; Random Forest; Decision Tree

Downloads

References

1. Abrantes, R., Mestre, P., & Cunha, A. (2021). Exploring dataset manipulation via machine learning for botnet traffic. CENTERIS – International Conference on ENTERprise Information Systems / ProjMAN – International Conference on Project MANagement / HCist – International Conference on Health and Social Care Information Systems and Technologies 2021. [Google Scholar] [Crossref]

2. Anwar, F., & Saravanan, S. (2022). Comparison of artificial intelligence algorithms for IoT botnet detection on Apache Spark platform. Procedia Computer Science, 215, 499–508. https://doi.org/10.1016/j.procs.2022.12.052 [Google Scholar] [Crossref]

3. Ayo, F., Awotunde, J., Folorunso, S., Adigun, M., & Ajagbe, S. (2023). A genomic rule-based KNN model for fast flux botnet detection. Egyptian Informatics Journal, 24(2), 313–325. https://doi.org/10.1016/j.eij.2023.05.002 [Google Scholar] [Crossref]

4. Cabello-Solórzano, K., Ortigosa de Araujo, I., Peña, M., Correia, L., & Tallón-Ballesteros, A. J. (2023). The impact of data normalization on the accuracy of machine learning algorithms: A comparative analysis. In P. García Bringas et al. (Eds.), 18th international conference on soft computing models in industrial and environmental applications (SOCO 2023) (pp. 373–382). Springer. https://doi.org/10.1007/978-3-031-42536-3_33 [Google Scholar] [Crossref]

5. CHIDI, E. U., UDANOR, C. N., & ANOLIEFO, E. (2024). Exploring the Depths of Visual Understanding: A Comprehensive Review on Real-Time Object of Interest Detection Techniques. Preprints. https://doi.org/10.20944/preprints202402.0583.v1 [Google Scholar] [Crossref]

6. Dai, Y. (2015). Analysis of decision tree algorithm in data mining and its application. Science and Technology Communication, 7(23), 33–34. [Google Scholar] [Crossref]

7. Fernández, A., García, S., Herrera, F., & Chawla, N. V. (2018). SMOTE for learning from imbalanced data: Progress and challenges, marking the 15-year anniversary. Journal of Artificial Intelligence Research, 61, 863–905. https://doi.org/10.1613/jair.5682 [Google Scholar] [Crossref]

8. Harbor M.C, Eneh I.I., Ebere U.C. (2021). Nonlinear dynamic control of autonomous vehicle under slip using improved back-propagation algorithm. International Journal of Research and Innovation in Applied Science (IJRIAS); Vol. 6; Issue 9; https://rsisinternational.org/journals/ijrias/DigitalLibrary/volume-6-issue-9/62-68.pdf [Google Scholar] [Crossref]

9. Hou, L. (2016). Application study of decision tree algorithm in engineering quality supervision decision support system [Doctoral dissertation, Guizhou University]. [Google Scholar] [Crossref]

10. Joshi, C., Ranjan, R., & Bharti, V. (2022). A fuzzy logic based feature engineering approach for botnet detection using ANN. Journal of King Saud University – Computer and Information Sciences, 34(8), 6045–6056. https://doi.org/10.1016/j.jksuci.2021.06.018 [Google Scholar] [Crossref]

11. Khan, S., & Mailewa, A. (2023). Discover botnets in IoT sensor networks: A lightweight deep learning framework with hybrid self-organizing maps. Microprocessors and Microsystems, 97, Article 104753. https://doi.org/10.1016/j.micpro.2022.104753 [Google Scholar] [Crossref]

12. Li, M. (2016). Application of decision tree algorithm in bank telemarketing [Doctoral dissertation, Huazhong University of Science and Technology]. [Google Scholar] [Crossref]

13. Li, W. (2014). Application and parallel study of decision tree algorithm [Doctoral dissertation, University of Electronic Science and Technology]. Advances in Intelligent Systems Research, 161. [Google Scholar] [Crossref]

14. Lo, W., Kulatilleke, G., Sarhan, M., Layeghy, S., & Portmann, M. (2023). XG-BoT: An explainable deep graph neural network for botnet detection and forensics. Internet of Things, 22, Article 100747. https://doi.org/10.1016/j.iot.2023.100747 [Google Scholar] [Crossref]

15. Mohaiminul, I., Chen, G., & Jin, S. (2019). An overview of neural network. American Journal of Neural Networks and Applications, 5(1), 7–11. https://doi.org/10.11648/j.ajnna.20190501.12 [Google Scholar] [Crossref]

16. Mousavi, S., Khansari, M., & Rahmani, R. (2020). A fully scalable big data framework for botnet detection based on network traffic analysis. Information Sciences, 512, 629–640. https://doi.org/10.1016/j.ins.2019.10.018 [Google Scholar] [Crossref]

17. Murphy, K. P. (2012). Machine learning: A probabilistic perspective. The MIT Press. [Google Scholar] [Crossref]

18. Nasir, M., Arshad, J., & Khan, M. (2023). Collaborative device-level botnet detection for internet of things. Computers & Security, 129, Article 103172. https://doi.org/10.1016/j.cose.2023.103172 [Google Scholar] [Crossref]

19. Nazir, A., He, J., Zhu, N., Wajahat, A., Ma, X., Ullah, F., Qureshi, S., & Pathan, M. (2023). Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets. Journal of King Saud University - Computer and Information Sciences, 35(10), Article 101820. https://doi.org/10.1016/j.jksuci.2023.101820 [Google Scholar] [Crossref]

20. Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., & Duchesnay, É. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12, 2825–2830. http://jmlr.org/papers/v12/pedregosa11a.html [Google Scholar] [Crossref]

21. Salman, H., Kalakech, A., & Steiti, A. (2024). Random forest algorithm overview. Babylonian Journal of Machine Learning, 2024, 69–79. https://doi.org/10.58496/BJML/2024/007 [Google Scholar] [Crossref]

22. Samuels, J. A. (2024). One-hot encoding and two-hot encoding: An introduction [Preprint]. ResearchGate. https://doi.org/10.13140/RG.2.2.12345.67890 (Note: Preprint DOI; full publication pending). [Google Scholar] [Crossref]

23. Sochima V.E. Asogwa T.C., Lois O.N. Onuigbo C.M., Frank E.O., Ozor G.O., Ebere U.C. (2025)”; Comparing multi-control algorithms for complex nonlinear system: An embedded programmable logic control applications; DOI: http://doi.org/10.11591/ijpeds.v16.i1.pp212-224 [Google Scholar] [Crossref]

24. Song, Y. Y., & Lu, Y. (2015). Decision tree methods: Applications for classification and prediction. Shanghai Archives of Psychiatry, 27(2), 130–135. https://doi.org/10.11919/j.issn.1002-0829.215044 [Google Scholar] [Crossref]

25. Ulagwu-Echefu A., Eneh. I.I. Ebere U.C. (2021). Enhancing realtime supervision and control of industrial processes over wireless network architecture using model predictive controller. International Journal of Research and Innovation in Applied Science (IJRIAS); vol 6; Issue 9. https://rsisinternational.org/journals/ijrias/DigitalLibrary/volume-6-issue-9/56-61.pdf [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles