Research Article

A Protocol-Independent Botnet Detection Method Using Flow Similarity

Figure 6

Infection flows from the perspective of vulnerable victim.