New Optimization Approaches in Malware Traffic Analysis