no code implementations • 15 Aug 2015 • Shachar Siboni, Asaf Cohen
We evaluate the algorithm on real-world network traces, showing how a universal, low complexity C&C identification system can be built, with high detection rates and low false-alarm probabilities.
Cryptography and Security