I. Introduction
Most of recent cyber-crime activities such as banking credential thefts and Distributed Denial of Service (DDoS) attacks are caused by botnets. A botnet consists of thousands of infected machines or bots around the globe that is controlled by a botmaster. In the past these bots were administrated using centralized Command and Control (C2) servers. However, such a C2 architecture represents a single point of failure and has been exploited in many botnet takedowns in the past. As a result, recent botnets have adopted a Peer-to-Peer(P2P)-based architecture. These P2P botnets are not only robust against random failures, but due to their self-organizing capabilities, they are also more robust against takedown attempts. Moreover, the architecture itself provides anonymity to the botmaster, as he can issue commands from any part of the botnet. These unique characteristics of P2P botnets have rendered them a popular research area in the past. Thus, many reports describing characteristics of botnets have been published [9], [7], [14]. However, most of them analyze the P2P protocols of the botnets, present measurements studies on the botnet population or propose botnet detection strategies. To the best of our knowledge there is no related work for P2P botnet graph reconstruction.