Research Article
Characterizing Anomalies in Malware-Generated HTTP Traffic
Table 4
List of HTTP requests’ structure features.
| |||||||||||||
Features proposed by the authors of this paper are marked with (an asterisk). |
| |||||||||||||
Features proposed by the authors of this paper are marked with (an asterisk). |