Research Article

Characterizing Anomalies in Malware-Generated HTTP Traffic

Figure 11

An example of the Suricata IDS rule based on presented observations. The rule detects POST requests in 1.0 version of the protocol without the Referer header.