This paper continues a line of work in
which empirical studies were performed to understand
modern botnets. More specifically, previous studies analyzed
botnets such as Storm Worm [10], Conficker [17],
Torpig [22], Waledac [15], MegaD [5], and Cutwail [23].
These studies introduced methods and techniques to observe
botnets and helped to obtain insights into the mechanisms
behind such networks of compromised machines.