Research Article

Spatial-Temporal Feature with Dual-Attention Mechanism for Encrypted Malicious Traffic Detection

Table 2

Settings of encrypted malicious traffic detection experiment.

Experiment numberClassification task

A2 classifications of benign and malicious encrypted traffic
BAdware, ransomware, scareware, SMS malware, and 4 classifications of encrypted malicious traffic by malware family
C13 classifications of encrypted malicious traffic by malware