Research Article

Characterizing Anomalies in Malware-Generated HTTP Traffic

Figure 2

An overview of the malware HTTP requests’ analysis workflow used in the paper.