Figure 1From: PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification PeerShark: architecture. Back to article page