Papers by Blessing Nwamaka Iduh
European Journal of Theoretical and Applied Sciences, 2024
Athlete injuries are a pervasive issue in sports, resulting in significant
consequences for athle... more Athlete injuries are a pervasive issue in sports, resulting in significant
consequences for athletic performance, career longevity, and overall
well-being. To address this challenge, we developed a predictive
modeling framework that leverages machine learning techniques to
identify athletes at high risk of injury. Our approach integrates a
range of athlete-specific data, including demographic, training, and
performance metrics, to generate personalized injury risk profiles. A
random forest classifier was employed to identify key predictors and
classify athletes into high- or low-risk categories. Our results
demonstrate a substantial improvement in injury prediction accuracy
compared to traditional methods, highlighting the potential of
machine learning in athlete injury prevention. This framework has important implications for coaches,
trainers, and medical professionals, enabling targeted interventions and optimized athlete performance.
Our study contributes to the growing body of research in sports analytics and machine learning,
underscoring the importance of data-driven approaches in promoting athlete health and performance.
Multimed. Res., Apr 1, 2024
Artificial Neural Networks (ANNs) are a type of machine learning algorithms that are used to solv... more Artificial Neural Networks (ANNs) are a type of machine learning algorithms that are used to solve problems such as medical diagnosis. In recent times, the amount of data that is generated daily is on the increase and the level of the complexity of problems is troubling. ANN algorithms are commonly used to overcome these challenges are further faced with the problem of having fixed data attributes as a dataset for its input layer, the complexity of having heterogeneous datasets instead of homogeneous datasets,and having a single objective output layer instead of a multi-objective output layer that could enable the diagnosis of multiple diseases. This researchproposes an enhanced modular-based Neural Network algorithm that utilizes heterogeneous datasets drawn from multiple sources, decomposed and clustered into independent units, and then trained by ANNs selected according to their learning paradigms-supervised, unsupervised, and reinforcement learning, to provide an effective, efficient and timely medical diagnosis, especially in developing countries where modern facilities are lacking with much dependence on manual methods.Thus an integrated system with multiple ANN techniques modelled into a single unit is developed. The results show that the proposed approach has been significantly successful indealing with the aforesaid problem compared to other methods with a training accuracy of 0.905, Sensitivity of 0.917, and specificity of 0.923.
IDOSR Journal of Scientific Research, Mar 11, 2024
Delivery of Health care services in developing nations has posed a huge problem to the world at l... more Delivery of Health care services in developing nations has posed a huge problem to the world at large. The United Nations and the World Health Organization have been on the front burner sorting for ways of improving these problems to abate the yearly mortality rates which are caused largely by inadequate health facilities, poor technical know-how, and poor health care administration. One disease that has a high number of patients is diabetes. In Nigeria, out of a population of 200 million, diabetes kills over 2% yearly. To reduce this menace, early diagnosis and awareness are important. And automation of the medical diagnostic system is one of the sure ways of achieving these feet. This paper explores the potential of a self-organizing map algorithm; a machine learning technique in the development of a diabetes mellitus diagnostic system (DMDS). Data collected from 120 patients from the University of Port Harcourt Teaching Hospital (UPTH) was used in the training and validation of the model. The confusion matrix formula was used in testing the sensitivity and accuracy of the model which yielded 75.63% and 87.2% respectively which are within the accepted range, predefined by expert physicians.
World Journal of Advanced Engineering Technology and Sciences, May 30, 2024
This paper presents the development of a software keylogger to monitor user activities within a c... more This paper presents the development of a software keylogger to monitor user activities within a cyber network, enhancing security and facilitating comprehensive cybersecurity analysis. Guided by the agile methodology, the work adopts a flexible and iterative approach to development, ensuring continuous collaboration, adaptation to evolving requirements, and swift response to feedback. Leveraging the versatility and efficiency of the Python programming language, this work transforms the traditional notion of a keylogger, which is a program that records keystrokes, into an ethical and legally compliant tool. By capturing and logging keystrokes, the system provides valuable insights into user behavior and potential security threats, enabling proactive measures to prevent cyber-attacks and data breaches. Prioritizing transparency and consent, the system design adheres to ethical standards and privacy regulations, ensuring the protection of sensitive information and user privacy. This technical solution offers cybersecurity professionals, system administrators, and organizations a valuable tool for network monitoring while showcasing responsible development practices and contributing to the advancement of ethical cybersecurity solutions.
SADI International Journal of Science, Engineering and Technology, 2024
In recent years, there has been a growing demand for innovative solutions to enhance public safet... more In recent years, there has been a growing demand for innovative solutions to enhance public safety and bridge the gap between citizens and law enforcement agencies. "Eyes on the Street" addresses this need by introducing a real-time reporting app designed to empower citizens to report crimes they witness firsthand, thereby facilitating quicker response times and more efficient crime management. The web-based application provides a user-friendly interface that is accessible to anyone with internet connectivity. Using HTML, CSS, Bootstrap, JavaScript, PHP/Laravel, and MySQL database technologies, the system allows users to submit detailed accounts of the incidents they observed, including descriptions and relevant multimedia evidence. Key features include streamlined reporting processes, secure data transmission, and administrative oversight for verifying and responding to reports. Administrators, typically representing law enforcement or crime control agencies, have access to a dashboard where they can review incoming reports, verify their authenticity, and take appropriate actions. Eyes on the Street aims to create safer environments and enhance public trust in law enforcement efforts by harnessing the collective vigilance of citizens and fostering closer collaboration between communities and crime control agencies. This research contributes to the evolving landscape of civic technology by leveraging digital platforms to empower individuals and strengthen the fabric of public safety.
Journal of Computational Mechanics, Power System and Control, 2024
Artificial Neural Networks (ANNs) are a type of machine learning algorithms that are used to solv... more Artificial Neural Networks (ANNs) are a type of machine learning algorithms that are used to solve problems such as medical diagnosis. In recent times, the amount of data that is generated daily is on the increase and the level of the complexity of problems is troubling. ANN algorithms are commonly used to overcome these challenges are further faced with the problem of having fixed data attributes as a dataset for its input layer, the complexity of having heterogeneous datasets instead of homogeneous datasets,and having a single objective output layer instead of a multi-objective output layer that could enable the diagnosis of multiple diseases. This researchproposes an enhanced modular-based Neural Network algorithm that utilizes heterogeneous datasets drawn from multiple sources, decomposed and clustered into independent units, and then trained by ANNs selected according to their learning paradigms-supervised, unsupervised, and reinforcement learning, to provide an effective, efficient and timely medical diagnosis, especially in developing countries where modern facilities are lacking with much dependence on manual methods.Thus an integrated system with multiple ANN techniques modelled into a single unit is developed. The results show that the proposed approach has been significantly successful indealing with the aforesaid problem compared to other methods with a training accuracy of 0.905, Sensitivity of 0.917, and specificity of 0.923.
World Journal of Advanced Engineering Technology and Sciences, 2024
This paper presents the development of a software keylogger to monitor user activities within a c... more This paper presents the development of a software keylogger to monitor user activities within a cyber network, enhancing security and facilitating comprehensive cybersecurity analysis. Guided by the agile methodology, the work adopts a flexible and iterative approach to development, ensuring continuous collaboration, adaptation to evolving requirements, and swift response to feedback. Leveraging the versatility and efficiency of the Python programming language, this work transforms the traditional notion of a keylogger, which is a program that records keystrokes, into an ethical and legally compliant tool. By capturing and logging keystrokes, the system provides valuable insights into user behavior and potential security threats, enabling proactive measures to prevent cyber-attacks and data breaches. Prioritizing transparency and consent, the system design adheres to ethical standards and privacy regulations, ensuring the protection of sensitive information and user privacy. This technical solution offers cybersecurity professionals, system administrators, and organizations a valuable tool for network monitoring while showcasing responsible development practices and contributing to the advancement of ethical cybersecurity solutions.
International Digital Organization for Scientific Research, 2024
Delivery of Health care services in developing nations has posed a huge problem to the world at l... more Delivery of Health care services in developing nations has posed a huge problem to the world at large. The United Nations and the World Health Organization have been on the front burner sorting for ways of improving these problems to abate the yearly mortality rates which are caused largely by inadequate health facilities, poor technical know-how, and poor health care administration. One disease that has a high number of patients is diabetes. In Nigeria, out of a population of 200 million, diabetes kills over 2% yearly. To reduce this menace, early diagnosis and awareness are important. And automation of the medical diagnostic system is one of the sure ways of achieving these feet. This paper explores the potential of a self-organizing map algorithm; a machine learning technique in the development of a diabetes mellitus diagnostic system (DMDS). Data collected from 120 patients from the University of Port Harcourt Teaching Hospital (UPTH) was used in the training and validation of the model. The confusion matrix formula was used in testing the sensitivity and accuracy of the model which yielded 75.63% and 87.2% respectively which are within the accepted range, predefined by expert physicians.
International Journal of Information Security, Privacy and Digital Forensics. An International Journal of the Nigeria Computer Society (NCS), 2022
The negative effects of Botnet on the cyberspace cannot be overemphasized. A Botnet is a group of... more The negative effects of Botnet on the cyberspace cannot be overemphasized. A Botnet is a group of compromised computer
systems that are connected to a central controller called a Botmaster. The Botmaster uses command and control (C&C) channels to manipulate
Botnets. Devices which are connected to the internet are prone to getting infected by botnets especially when they visit unknown sites, click
on unknown links or download free software online. Botnets are continuously being used to perform malicious activities on the internet
without the knowledge of the true owners of the systems they infect, and the Botmasters keep developing new botnet toolkits that are
encrypted, hence it became very necessary, to implement some advanced techniques like the use of machine learning algorithms to detect
and manage Botnets. This paper presents a Botnet management model for analyzing and detecting Botnet traffics in a Network. In
implementing the model, anomaly based detection technique using netflow data collection was used. The machine learning algorithms which
include Decision Tree Classifier, logistic regression and K-Nearest Neighbors were implemented to classify the network traffic and find
clusters of flows sharing similar timing and packet size characteristics. Wire Shark, Python programming Language and its libraries were
some of the tools used. The model captured, analyzed and classified both encrypted and unencrypted traffic and the Decision Tree Classifier
Algorithm gave the highest percentage of up to 99% accuracy in classifying the Botnet traffic; the Logistic Regression Classifier gave 96%
accuracy while the K-Nearest Neighbors gave a 96% accuracy. From the results, the new model was able to classify and detect unknown
Botnets and encrypted C&C Channels, this helped to detect systems on the network that were part of a Botnet.
JOURNAL OF INFORMATION SECURITY, PRIVACY AND DIGITAL FORENSIC, 2022
The negative effects of Botnet on the cyberspace cannot be overemphasized. A Botnet is a group of... more The negative effects of Botnet on the cyberspace cannot be overemphasized. A Botnet is a group of compromised computer systems that are connected to a central controller called a Botmaster. The Botmaster uses command and control (C&C) channels to manipulate Botnets. Devices which are connected to the internet are prone to getting infected by botnets especially when they visit unknown sites, click on unknown links or download free software online. Botnets are continuously being used to perform malicious activities on the internet without the knowledge of the true owners of the systems they infect, and the Botmasters keep developing new botnet toolkits that are encrypted, hence it became very necessary, to implement some advanced techniques like the use of machine learning algorithms to detect and manage Botnets. This paper presents a Botnet management model for analyzing and detecting Botnet traffics in a Network. In implementing the model, anomaly based detection technique using netflow data collection was used. The machine learning algorithms which include Decision Tree Classifier, logistic regression and K-Nearest Neighbors were implemented to classify the network traffic and find clusters of flows sharing similar timing and packet size characteristics. Wire Shark, Python programming Language and its libraries were some of the tools used. The model captured, analyzed and classified both encrypted and unencrypted traffic and the Decision Tree Classifier Algorithm gave the highest percentage of up to 99% accuracy in classifying the Botnet traffic; the Logistic Regression Classifier gave 96% accuracy while the K-Nearest Neighbors gave a 96% accuracy. From the results, the new model was able to classify and detect unknown Botnets and encrypted C&C Channels, this helped to detect systems on the network that were part of a Botnet.
International Journal of Computer Trends and Technology, 2018
The recurrent incidences of car theft in our society today, has made it necessary to research on ... more The recurrent incidences of car theft in our society today, has made it necessary to research on a lasting formula that will put paid this menace. In another dimension, the time wastage encountered during the usual routine stop-and-checks carried out by our security agencies in Nigeria cannot be over emphasized. This study is intended to analyse how on one hand, the process of vehicle checks by Stop-and-search police officers can be successfully carried out from any spot including remote areas without subjecting vehicle owners or users to untold hardship and harassment. On the other hand, this study will also experiment on how stolen vehicles can be detected in the course of routine vehicle checks. Summarily therefore, this paper seeks to design a Real-time vehicle inspection and security management system that will send a short message to a particular designated short code, which in turns brings back all necessary information needed by the vehicle inspection team to verify the authenticity of the vehicle documents presented for review and validity of acclaimed vehicle ownership. The Structured System Analysis and Design Methodology was used for this work. The system is designed using PHP and MYSQL server. If the system is implemented with the right technology, the unnecessary time wastage during the routine stop-and check activities and the incidences of car snatching will be reduced to the barest minimum.
Botnets have in recent times, become a very major challenge in the cyberspace. The Global Interne... more Botnets have in recent times, become a very major challenge in the cyberspace. The Global Internet has experienced tremendous attacks designed mainly to disable internet infrastructure on one hand, while in most other cases people and organizations are targeted. At the center of these attacks are a group of compromised computers that have been infested and are now controlled by a Botmaster. These systems are usually located in schools, business premises, homes and government agencies which, unknown to their owners, are infested and controlled by Botmasters for malicious activities. This paper presents an analysis of Botnet with respect to its architectural representation, classification and characterization in order to help coordinate the development of new technologies to face this serious security threat. Index Terms Peer to Peer (P2P), Botnet, Command and Control Channel (C&C), Botnet Detection, Cyber Security
International Journal of Science and Engineering Research, 2021
Creating Botnet detection systems have become very imperative, due to the continued creation of n... more Creating Botnet detection systems have become very imperative, due to the continued creation of newer Botnet toolkits by cyber criminals. A Botnet is a network of compromised computerized devices that are connected to a central controller called a Botmaster. These devices are usually used to carry out malicious activities like identity theft, sending of spam mails, DOS attacks and other damaging acts without the knowledge of the actual owner of the device. Botnet detection using advanced techniques has become very necessary as Botmasters continue to device new means of attack. This paper therefore, presents some relevant tools and procedures involved in creating a Botnet detection system, and how to apply these tools using machine learning algorithms. Some of the tools presented in this work include; Scikit Learn, Pandas, Theano, Keras, Matplotlib, Pickel, Numpy, Tensorflow, amongst others. This paper also shows the steps involved in applying these tools.
International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS), 2020
WhatsApp is an instant messaging application which enables users to send and receive messages in ... more WhatsApp is an instant messaging application which enables users to send and receive messages in real time. It is a platform that has created an enabling environment for users to communicate with friends, groups and business partners at a cost of only a little internet access. This application has created opportunities for users to make free calls internationally in both audio and video modes. It has also provided the means for users to send broadcast messages to as many as 256 contacts at the same time. WhatsApp has helped individuals of like minds to create groups for diverse purposes. This paper, presents WhatsApp network group chat analysis, using Python programming language. The objective is of this paper is to present an analysis of the WhatsApp group data to ascertain the level of involvement and participation by members in that group chat. Also, it involves the analysis of the most active date in the group, the number of messages sent on that date, the overall most active user, list of active admins in the group, total number of users, number of posts made by each individuals on the group, and the most used word on the platform. Also an analysis of the top 10 and top 20 users were done. The system was done with Python, and the Python libraries that were applied includes, Numpy, Pandas, Matplotlib and Seaborn. At the end of the work the expected results were obtained and the analysis was able to show the level of participation of the various individuals on the given WhatsApp group.
Botnets have in recent times, become a very major challenge in the cyberspace. The Global Interne... more Botnets have in recent times, become a very major challenge in the cyberspace. The Global Internet has experienced tremendous attacks designed mainly to disable internet infrastructure on one hand, while in most other cases people and organizations are targeted. At the center of these attacks are a group of compromised computers that have been infested and are now controlled by a Botmaster. These systems are usually located in schools, business premises, homes and government agencies which, unknown to their owners, are infested and controlled by Botmasters for malicious activities. This paper presents an analysis of Botnet with respect to its architectural representation, classification and characterization in order to help coordinate the development of new technologies to face this serious security threat. Index Terms-Peer to Peer (P2P), Botnet, Command and Control Channel (C&C), Botnet Detection, Cyber Security 1.0. INTRODUCTION The word Botnet, is a combination of the words robot and network. It is used to describe a group of compromised computer systems that are usually connected to a central controller called a Botmaster. The Botmaster uses command and control (C&C) channels, to manipulate these infested computers. A single infested system is known as a bot, while a network of infested devices is referred to as a Botnet. Botnets are created by the Botmaster for communication infrastructure to perform malicious activities like spamming, click fraud, identity theft, phishing attacks and distributed denial of service attacks. Characterizing existing Botnets will help to coordinate and develop new technologies to face this serious security threat. Systems that are connected to the internet have the chances of getting infested and become part of a Botnet. Several Researchers like [1], [2], [3] amongst others, have worked extensively on Botnets with respect to its classification and functionalities. According to [4] Botnets can be classified according to their attacking behavior, command and control (C&C) mechanism, rallying mechanisms, communication protocols, evasion techniques and other activities such as abnormal system calls and traceable DNS queries. [5], in their survey of the categories of Botnets, noted that Botnets can be classified into six basic types based on the C&C channel used. These include, according to them, IRC (Internet Relay Chat) Botnet, P2P (Peer-to-Peer) Botnet, HTTP (Hyper Text Transfer Protocol) Botnet, Mobile Botnet, Cloud Botnet and the hybrid Botnet which according to them, is the combination of all the types of Botnet Structures. These Botnets can be grouped into two categories, and these include, the Centralized Botnets and the Decentralized Botnets. I. Centralized Botnets Architecture Centralized Botnets usually have a centralized network topology. They consist of a Command and Control (C&C) server that a Botmaster uses to send commands to their bots. A Botmaster will issue a command by posting a message to this channel. The C&C server pushes the command to bots which then invoke the command with a relatively low latency. As long as the infested machine is on and has an active Internet connection, it will remain connected to the C&C server awaiting commands. In the survey presented by [6], they noted that the centralized Botnets are similar to a client server model. All the bots act as clients and connect to the centralized servers. The servers initiate commands to these bots which are connected to it. In the centralized Botnet architecture, the Botmaster can monitor all the bots and receive direct and accurate feedback along with the status of the Botnet. This tallied with the work of [7], where they noted that, the centralized Botnet, has one center point that is accountable for exchanging commands and malicious data between the Botmaster and Bots. They also recorded that in this centralized model, the Botmaster chooses a host which is usually a high bandwidth computer, to be the central point which will be the Command-and-Control server of all the Bots. Centralised Botnets belong to the first generation of Botnets where the Botmaster controls the bots through a single C&C server at a single point in form of a star topology. According to [8], three types of centralized Botnets architecture exit and these include the Internet Relay Chat (IRC) Botnets, Internet Messaging (IM) Based Botnets and the Hypertext Transfer Protocol (HTTP) Based Botnet architecture. II. Internet Relay Chat (IRC) Botnets Internet Relay Chat (IRC) is a text-based chat-system that organizes communication in channels. According to the survey done by [5], the Botmaster exploits the Internet Relay Chat (IRC) as the C&C Channel to communicate and control the bots. Also, [8]recorded that IRC is an on-line text-based instant messaging protocol that works on client-server architecture. They further stated that IRC is capable of connecting hundreds of clients through multiple servers, and that clients can be contacted using one
The recurrent incidences of car theft in our society today, has made it necessary to research on ... more The recurrent incidences of car theft in our society today, has made it necessary to research on a lasting formula that will put paid this menace. In another dimension, the time wastage encountered during the usual routine stop-and-checks carried out by our security agencies in Nigeria cannot be over emphasized. This study is intended to analyse how on one hand, the process of vehicle checks by Stop-and-search police officers can be successfully carried out from any spot including remote areas without subjecting vehicle owners or users to untold hardship and harassment. On the other hand, this study will also experiment on how stolen vehicles can be detected in the course of routine vehicle checks. Summarily therefore, this paper seeks to design a Real-time vehicle inspection and security management system that will send a short message to a particular designated short code, which in turns brings back all necessary information needed by the vehicle inspection team to verify the authenticity of the vehicle documents presented for review and validity of acclaimed vehicle ownership. The Structured System Analysis and Design Methodology was used for this work. The system is designed using PHP and MYSQL server. If the system is implemented with the right technology, the unnecessary time wastage during the routine stop-and check activities and the incidences of car snatching will be reduced to the barest minimum.
— This research work was done in order to examine the software processes involved in the creation... more — This research work was done in order to examine the software processes involved in the creation of Unmanned Aerial Vehicles. As software capabilities advances, it becomes incumbent on software engineers to device systems that are able to respond to complex situations in ways that humans cannot. Using computer vision as source of environmental data, this work tends to show the steps involved in the software workings of UAVs. The objective of this work thus, is to devise a software that can make an unmanned aerial vehicle (UAVs) to function. At the end of the work, the new system was able to identify a target based on some given specifications and it was also able to figure out the target amongst other images surrounding it. The programming languages used includes; Python, Open Computer Vision (OpenCV), Matlab plotting Library (Matplotlib) and cMake. These programming languages were integrated to achieve this work.
Uploads
Papers by Blessing Nwamaka Iduh
consequences for athletic performance, career longevity, and overall
well-being. To address this challenge, we developed a predictive
modeling framework that leverages machine learning techniques to
identify athletes at high risk of injury. Our approach integrates a
range of athlete-specific data, including demographic, training, and
performance metrics, to generate personalized injury risk profiles. A
random forest classifier was employed to identify key predictors and
classify athletes into high- or low-risk categories. Our results
demonstrate a substantial improvement in injury prediction accuracy
compared to traditional methods, highlighting the potential of
machine learning in athlete injury prevention. This framework has important implications for coaches,
trainers, and medical professionals, enabling targeted interventions and optimized athlete performance.
Our study contributes to the growing body of research in sports analytics and machine learning,
underscoring the importance of data-driven approaches in promoting athlete health and performance.
systems that are connected to a central controller called a Botmaster. The Botmaster uses command and control (C&C) channels to manipulate
Botnets. Devices which are connected to the internet are prone to getting infected by botnets especially when they visit unknown sites, click
on unknown links or download free software online. Botnets are continuously being used to perform malicious activities on the internet
without the knowledge of the true owners of the systems they infect, and the Botmasters keep developing new botnet toolkits that are
encrypted, hence it became very necessary, to implement some advanced techniques like the use of machine learning algorithms to detect
and manage Botnets. This paper presents a Botnet management model for analyzing and detecting Botnet traffics in a Network. In
implementing the model, anomaly based detection technique using netflow data collection was used. The machine learning algorithms which
include Decision Tree Classifier, logistic regression and K-Nearest Neighbors were implemented to classify the network traffic and find
clusters of flows sharing similar timing and packet size characteristics. Wire Shark, Python programming Language and its libraries were
some of the tools used. The model captured, analyzed and classified both encrypted and unencrypted traffic and the Decision Tree Classifier
Algorithm gave the highest percentage of up to 99% accuracy in classifying the Botnet traffic; the Logistic Regression Classifier gave 96%
accuracy while the K-Nearest Neighbors gave a 96% accuracy. From the results, the new model was able to classify and detect unknown
Botnets and encrypted C&C Channels, this helped to detect systems on the network that were part of a Botnet.
consequences for athletic performance, career longevity, and overall
well-being. To address this challenge, we developed a predictive
modeling framework that leverages machine learning techniques to
identify athletes at high risk of injury. Our approach integrates a
range of athlete-specific data, including demographic, training, and
performance metrics, to generate personalized injury risk profiles. A
random forest classifier was employed to identify key predictors and
classify athletes into high- or low-risk categories. Our results
demonstrate a substantial improvement in injury prediction accuracy
compared to traditional methods, highlighting the potential of
machine learning in athlete injury prevention. This framework has important implications for coaches,
trainers, and medical professionals, enabling targeted interventions and optimized athlete performance.
Our study contributes to the growing body of research in sports analytics and machine learning,
underscoring the importance of data-driven approaches in promoting athlete health and performance.
systems that are connected to a central controller called a Botmaster. The Botmaster uses command and control (C&C) channels to manipulate
Botnets. Devices which are connected to the internet are prone to getting infected by botnets especially when they visit unknown sites, click
on unknown links or download free software online. Botnets are continuously being used to perform malicious activities on the internet
without the knowledge of the true owners of the systems they infect, and the Botmasters keep developing new botnet toolkits that are
encrypted, hence it became very necessary, to implement some advanced techniques like the use of machine learning algorithms to detect
and manage Botnets. This paper presents a Botnet management model for analyzing and detecting Botnet traffics in a Network. In
implementing the model, anomaly based detection technique using netflow data collection was used. The machine learning algorithms which
include Decision Tree Classifier, logistic regression and K-Nearest Neighbors were implemented to classify the network traffic and find
clusters of flows sharing similar timing and packet size characteristics. Wire Shark, Python programming Language and its libraries were
some of the tools used. The model captured, analyzed and classified both encrypted and unencrypted traffic and the Decision Tree Classifier
Algorithm gave the highest percentage of up to 99% accuracy in classifying the Botnet traffic; the Logistic Regression Classifier gave 96%
accuracy while the K-Nearest Neighbors gave a 96% accuracy. From the results, the new model was able to classify and detect unknown
Botnets and encrypted C&C Channels, this helped to detect systems on the network that were part of a Botnet.