Title: Performance comparison of feature selection algorithms in context of P2P botnet detection

Authors: Sangita Baruah; Vaskar Deka

Addresses: Department of Computer Science and Information Technology, Cotton University, India ' Department of Information Technology, Gauhati University, India

Abstract: Over the years, the use of internet has grown exponentially. As a result, crime on the internet has also grown. Botnets serve as the main technological backbone for a wide array of cyberattacks. As evident from various literatures, machine learning algorithms has a lot of potential in the detection of botnets. However, dimensionality of real-world datasets creates bottleneck in analysis. In this context, feature selection techniques have come up as a great tool in reducing the dimensionality without losing the physical interpretation of the original data. In this paper, we compare three different approaches of feature selection. We explore and compare three feature selection techniques categorised under filter, wrapper, and embedded methods. After conducting feature selection, we have employed six supervised machine learning classifiers for classification and detection of P2P botnet flows. Additionally, we have employed majority voting ensemble learning algorithm to improve the classification results.

Keywords: P2P botnet detection; feature selection; filter method; wrapper method; embedded method; variance threshold; recursive feature elimination; RFE; decision tree.

DOI: 10.1504/IJICS.2025.147759

International Journal of Information and Computer Security, 2025 Vol.27 No.3, pp.379 - 404

Received: 09 Apr 2024
Accepted: 16 Oct 2024

Published online: 30 Jul 2025 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article