This document summarizes a research paper that proposes using ensemble classifier algorithms to detect botnet traffic from normal network traffic. The paper experiments with bagging, boosting, and random forest classifiers to compare their ability to accurately classify network flows as either botnet or normal traffic. The models are trained and evaluated using the CTU-13 dataset, which contains labeled botnet and normal traffic data. Feature selection is performed to identify the most important attributes for classification, finding source IP, destination IP, start time, duration, protocol, protocol state, number of packets, and total bytes to be the top features. 10-fold cross validation is used to evaluate the performance of the proposed botnet detection models.
Related topics: