This book contains:Introduction related to Bot/malware, Botnet (that hackers always try to create to do offensive actions like steel the personal information, Bit-coin losses etc.),Genesis of the problem, Problem statement, Objective,Contribution, and General layout of the project. Literature survey based on different detection techniques (like Honeypot, Machine learning, and other Intrusion detection techniques), comparative analysis (on Mining,Signature, DNS and Anomaly based approach). Proposed model, Flow chart and Algorithm for detection of traffic using classification and clustering machine learning algorithms. Result, Discussion, Conclusion and Feature scope based on partitioning of dataset and implementation of classification, clustering of Machine Learning, and hybrid approach (classification & clustering) to find out the accuracy. This book can help the students to enhance their knowledge and start working in the same field of research.