Feature Analysis of Encrypted Malicious Traffic