Research Article

A Protocol-Independent Botnet Detection Method Using Flow Similarity

Figure 3

Attack flows from the perspective of bot.