Research Article
Spatial-Temporal Feature with Dual-Attention Mechanism for Encrypted Malicious Traffic Detection
Table 1
Number of encrypted malicious traffic samples after preprocessing.
| Categories | Fine-grained categories | Malware categories | Number of encrypted data streams |
| Normal traffic | Benign | ā | 75407 |
| Abnormal traffic | SMSMalware | Plankton | 6853 | Nandrobox | 5693 | FakeNotify | 4979 | Biige | 6024 | Scareware | VirusShield | 4463 | FakeTaoBao | 5016 | FakeAV | 6011 | AndroidSpy.277 | 4126 | Ransomware | WannaLocker | 6550 | RansomBO | 7197 | LockerPin | 5013 | Charger | 7548 | Adware | Youmi | 5496 | Koodous | 5245 | Kemoge | 6896 | Ewind | 6380 |
|
|