I. Introduction
Botnets are networks of computing devices infected with malicious software that is under the control of an attacker, known as bot herder or botmaster [2]. The owner of the botnet controls the bots (i.e., devices that become part of the botnet) through command and control (C&C) server(s) which can communicate with the bots using a C&C channel and can launch various attacks through these bots, including, but not limited to, denial of service (DoS) attacks, information and identity theft, sending spam messages, and other activities. Naturally, a botmaster's goal is to make it difficult for law enforcement to detect and prevent malicious operations. Therefore, establishing a secure C&C infrastructure and hiding the identities of the C&C servers play a key role in the long-lasting operation of botnets.