Research Article
Spatial-Temporal Feature with Dual-Attention Mechanism for Encrypted Malicious Traffic Detection
Table 11
Comparison results of experiment B.
| Models | Index | Ransomware | Adware | SMSMalware | Scareware |
| Deep-package | AC | 67.244 | 65.432 | 54.679 | 50.610 | PR | 74.037 | 61.211 | 56.306 | 46.934 | RC | 67.244 | 65.432 | 54.679 | 50.061 | F1 | 70.477 | 63.251 | 55.481 | 48.447 |
| Feature analysis | AC | 79.011 | 75.682 | 67.686 | 59.579 | PR | 77.037 | 72.907 | 67.747 | 64.752 | RC | 79.011 | 75.682 | 67.686 | 59.579 | F1 | 78.012 | 74.269 | 67.716 | 62.058 |
| HAST | AC | 90.564 | 89.996 | 86.658 | 83.655 | PR | 91.713 | 90.964 | 83.800 | 83.505 | RC | 90.564 | 89.996 | 86.658 | 82.655 | F1 | 91.135 | 90.477 | 85.205 | 83.078 |
| TLARNN | AC | 94.287 | 90.975 | 84.500 | 86.063 | PR | 89.786 | 93.810 | 89.812 | 83.023 | RC | 94.287 | 90.975 | 84.499 | 86.063 | F1 | 91.981 | 92.371 | 87.075 | 84.515 |
|
|