Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2020
/
Article
/
Fig 11
/
Research Article
Characterizing Anomalies in Malware-Generated HTTP Traffic
Figure 11
An example of the Suricata IDS rule based on presented observations. The rule detects
POST
requests in 1.0 version of the protocol without the
Referer
header.