“…Most of the cybercriminals are able to install different online applications into the computer and network systems of selected victims in determined government agencies, private organizations and academic institutions [6,7,8,9,10]. In addition to these applications some cybercriminals and malicious users send special IPv4 and IPv6 network addresses and web hyperlinks to the marked victims in order to gain an unauthorized access to the computer and network resources [6,7,8,9,10].…”