“…Some works used the features such as packet rate, packet arrival time, packet size, payload, etc., to detect worms in their transferring phase [132-135, 137, 138, 140, 145-147, 153]. Host-level data are used in conjunction with packet-level and flow-level data because worms are malicious programs that directly execute at host-side [138,140]. Each kind of worms has different reflecting characteristics.…”