Research Article
Spatial-Temporal Feature with Dual-Attention Mechanism for Encrypted Malicious Traffic Detection
Table 2
Settings of encrypted malicious traffic detection experiment.
| Experiment number | Classification task |
| A | 2 classifications of benign and malicious encrypted traffic | B | Adware, ransomware, scareware, SMS malware, and 4 classifications of encrypted malicious traffic by malware family | C | 13 classifications of encrypted malicious traffic by malware |
|
|