A Survey on Malicious Domains Detection 1 : 3 DNS data collection Data enrichment Algorithm design Evaluation