M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster, Building a dynamic reputation system for dns, USENIX security symposium, pp.273-290, 2010.

L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi, Exposure, NDSS, 2011.
DOI : 10.1109/ICPR.2008.4761472

D. Vincent, J. Blondel, R. Guillaume, E. Lambiotte, and . Lefebvre, Fast unfolding of community hierarchies in large networks, 2008.

H. Choi and H. Lee, Identifying botnets by capturing group activities in DNS traffic, Computer Networks, vol.56, issue.1, pp.20-33, 2012.
DOI : 10.1016/j.comnet.2011.07.018

Y. Cohen, D. Gordon, and D. Hendler, Early Detection of Outgoing Spammers in Large-Scale Service Provider Networks, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.83-101, 2013.
DOI : 10.1007/978-3-642-39235-1_5

. Cyren, The web information company, 2016.

. Dambella, The web information company, 2016.

R. De-maesschalck, D. Jouan-rimbaud, L. Désiré, and . Massart, The mahalanobis distance. Chemometrics and intelligent laboratory systems, pp.1-18, 2000.

Z. Huang, Extensions to the k-means algorithm for clustering large data sets with categorical values, Data Mining and Knowledge Discovery, vol.2, issue.3, pp.283-304, 1998.
DOI : 10.1023/A:1009769707641

D. Sepandar, . Kamvar, T. Mario, H. Schlosser, and . Garcia-molina, The eigentrust algorithm for reputation management in p2p networks, Proceedings of the 12th international conference on World Wide Web, pp.640-651, 2003.

I. Mishsky, N. Gal-oz, and E. Gudes, A Topology Based Flow Model for Computing Domain Reputation, Data and Applications Security and Privacy XXIX -29th Annual IFIP WG 11.3 Working Conference Proceedings, pp.277-292, 2015.
DOI : 10.1007/978-3-319-20810-7_20

L. Page, S. Brin, R. Motwani, and T. Winograd, The pagerank citation ranking: Bringing order to the web, 1999.

R. Perdisci, I. Corona, and G. Giacinto, Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.5, pp.714-726, 2012.
DOI : 10.1109/TDSC.2012.35

B. Rahbarinia, R. Perdisci, and M. Antonakakis, Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp.403-414, 2015.
DOI : 10.1109/DSN.2015.35

E. Stinson and J. C. Mitchell, Towards systematic evaluation of the evadability of bot/botnet detection methods, Proceedings of the 2Nd Conference on USENIX Workshop on Offensive Technologies, WOOT'08, pp.1-5, 2008.

R. Villamarín-salomón and J. C. Brustoloni, Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic, 2008 5th IEEE Consumer Communications and Networking Conference, pp.476-481, 2008.
DOI : 10.1109/ccnc08.2007.112

R. Villamarín-salomón and J. C. Brustoloni, Bayesian bot detection based on dns traffic similarity VirusTotal. A free virus, malware and URL online scanning service, Proceedings of the 2009 ACM symposium on Applied Computing, pp.2035-2041, 2009.

K. S. , W. Xu, and Y. Zhang, We know it before you do: Predicting malicious domains, VIRUS BULLETIN CONFERENCE, 2014.

H. Ian, E. Witten, and . Frank, Data Mining: Practical machine learning tools and techniques, 2005.