Research Article
Characterizing Anomalies in Malware-Generated HTTP Traffic
Table 7
List of HTTP request payload features.
| |||||||||
Features proposed by the authors of this paper are marked with (an asterisk). |
| |||||||||
Features proposed by the authors of this paper are marked with (an asterisk). |