Detecting botnet signals using process mining

Detecting and elucidating botnets is an active area of research. Using explainable, highly scalable Apache Spark-based artificial intelligence, process mining technologies are presented which illuminate bot activity within terrorist Twitter data. A derived hidden Markov model suggests that bot logic...

Full description

Saved in:
Bibliographic Details
Published inComputational and mathematical organization theory Vol. 27; no. 2; pp. 161 - 178
Main Authors Bicknell, John W., Krebs, Werner G.
Format Journal Article
LanguageEnglish
Published New York Springer US 01.06.2021
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1381-298X
1572-9346
DOI10.1007/s10588-020-09320-x

Cover

More Information
Summary:Detecting and elucidating botnets is an active area of research. Using explainable, highly scalable Apache Spark-based artificial intelligence, process mining technologies are presented which illuminate bot activity within terrorist Twitter data. A derived hidden Markov model suggests that bot logic uses information camouflage in order to disguise intentions similar to World War II Nazi propagandists and Soviet-era practitioners of information warfare enhanced with reflexive control. A future effort is presented which strings together best of breed techniques into a composite classification algorithm in order to improve continually the discovery of malicious accounts, understand cross-platform weaponized botnet dynamics, and model adversarial information warfare campaigns recursively.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1381-298X
1572-9346
DOI:10.1007/s10588-020-09320-x