Figure 4: Flow of malicious domain names detection.