This document discusses modeling network traffic behaviors to detect botnets. It proposes modeling individual network connections as state sequences based on flow size, duration, and periodicity. Connections are grouped by source/destination IP, port, and protocol. Labeled network data is used to train Markov chain models of normal and botnet connection behaviors. These models are then tested on unlabeled data to detect similar behaviors and identify botnet connections with over 70% accuracy on average. Compared methods achieve lower accuracy rates, showing this behavioral modeling approach is effective for botnet detection.