Research Article

Spatial-Temporal Feature with Dual-Attention Mechanism for Encrypted Malicious Traffic Detection

Table 11

Comparison results of experiment B.

ModelsIndexRansomwareAdwareSMSMalwareScareware

Deep-packageAC67.24465.43254.67950.610
PR74.03761.21156.30646.934
RC67.24465.43254.67950.061
F170.47763.25155.48148.447

Feature analysisAC79.01175.68267.68659.579
PR77.03772.90767.74764.752
RC79.01175.68267.68659.579
F178.01274.26967.71662.058

HASTAC90.56489.99686.65883.655
PR91.71390.96483.80083.505
RC90.56489.99686.65882.655
F191.13590.47785.20583.078

TLARNNAC94.28790.97584.50086.063
PR89.78693.81089.81283.023
RC94.28790.97584.49986.063
F191.98192.37187.07584.515