Identifying malicious hosts involved in periodic communications | IEEE Conference Publication | IEEE Xplore