Research Article
A Novel Approach for Malicious URL Detection Based on the Joint Model
Table 4
The influence of each algorithm on the experimental results.
| | Total | ACC (%) | P (%) | R (%) | F (%) |
| | Attention | 99.58 | 99.7 | 99.44 | 99.57 | | CapsNet | 99.74 | 99.52 | 99.96 | 99.74 | | CNN | 99.62 | 99.7 | 99.1 | 99.62 | | LSTM | 99.65 | 99.8 | 99.49 | 99.64 | | Bi-LSTM | 99.74 | 99.58 | 99.89 | 99.73 | | IndRNN | 99.52 | 99.59 | 99.44 | 99.52 | | Bi-IndRNN | 99.68 | 99.43 | 99.93 | 99.68 | | Our | 99.89 | 99.83 | 99.95 | 99.89 |
|
|