Balancing security with resource constraints for effective DNS-tunneling attack detection in real-time.