“…On the other hand, information about legal flux service is more genuine detailed. Consequently, a fast-flux attack holds the following poor quality (Al-Duwairi and Al-Hammouri, 2014; Celik & Oktug, 2013;Futai, Siyu, & Weixiong, 2013;Gržnić, Perhoč, Marić, Vlašić, & Kulcsar, 2014;Hao et al, 2011;Hsu, Huang, & Chen, 2010;Hsu et al, 2014, Huang, Mao, & Lee, 2010Khattak, Ramay, Khan, Syed, & Khayam, 2014;Lin, Lin, & Chiang, 2013;Mahjoub, 2013;Martinez-Bea, Castillo-Perez, & GarciaAlfaro, 2013;Paul, Tyagi, Manoj, & Thanudas, 2014;Shen, Wu, Yang, & Huang, 2013;Stalmans, Hunter, & Irwin, 2012;Wang, Mao, Wu, & Lee, 2012;Yadav, Reddy, Narasimha Reddy, & Ranjan, 2012):…”