Introduction - If you have any usage issues, please Google them yourself
Malicious software often used means of communication--- tunneling technology, and a HTTP based on C4.5
Tunnel detection algorithm. The algorithm uses a decision support tree algorithm
C4.5 extraction of network flow characteristics of the HTTP tunnel classification decision tree detection model, using the classification model checking HTTP tunnel flow field, according to the feature field generated training data provide the basis for the detection of malicious software.