Research Article

Characterizing Anomalies in Malware-Generated HTTP Traffic

Figure 1

Listing of an exemplary HTTP request (some of the lines were wrapped to fit the table).