I. Introduction
Botnets continue to be a significant source of large scale attacks on the Internet with recent increases in the volume of attack traffic [1]. A typical botnet platform is composed of command and control (C&C) servers, an infection vector to create new bots, and the bots (compromised hosts). Botnets are used for a variety of purposes including distributed denial of service (DDoS) attacks, spamming, and phishing attacks. The “owners” of the botnet, or botmasters, may be selling their attack services to the highest bidder or pursuing political or personal agendas.