“…In such attacks, the adversary can utilize a set of domains and IP addresses to orchestrate sophisticated attacks [56,12]. Therefore, the ability to identify a malicious domain in advance is a massive game-changer [11,12,14,15,18,20,22,25,26,27,37,45,49,56,60,61,64].…”