Research Article

A Protocol-Independent Botnet Detection Method Using Flow Similarity

Figure 4

Attack flows from the perspective of vulnerable victim.