Fig. 3From: Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendationsThe flow of Botnet attack from the Botmaster to the target devices across the command & control networkBack to article page