This document summarizes a machine learning approach for botnet detection using binary classification and analysis of IRC logs. It discusses using n-gram features extracted from binary executables to train supervised learning classifiers like Naive Bayes, SVM, kNN, and decision trees to classify binaries as benign or botnet. It also discusses obtaining labeled IRC logs for botnet communication and using them to detect botnet activity, but notes data limitations. The goal is to use machine learning for early detection of botnet binaries and monitoring of IRC channels to disrupt botnets.
Related topics: