Skip to main content
. 2023 Jul 11;23(14):6302. doi: 10.3390/s23146302

Table 2.

Characteristics of botnet scenarios.

Id IRC SPAM CF PS DDoS FF P2P US HTTP
1 X X X
2 X X X
3 X X X
4 X X X
5 X X X
6 X
7 X
8 X
9 X X X X
10 X X X
11 X X X
12 X
13 X X X