I. Introduction
Botnet, rendered as a relentless threat to the digital world, is like a ghost that changes in form or shape but never dissipates. Since the first Internet relay chatting (IRC)-based botnet emerged in 1993, it has become a dangerous threat that is difficult to detect and dismantle [1] from time to time. The botnet is a network of compromised machines, individually referred to as bots or zombies, and controlled remotely by a malicious entity known as the Botmaster. For decades, the most everlasting characteristic of the botnet is its large scale, i.e., the number of victims can reach up to or more than 10000 [2], such as Srizbi [3], Shamoon [4], Kraken [5], Zeus [6], [7], Retadup [8], [9], etc. Thereafter, added with new features of specialization and fine-grained control, botnets are evolving and tailored continuously to fit the advanced persistent threat (APT) [10], a stealthy threat actor, typically a nation-state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.