Research Article

Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection

Table 7

This is a table, T. Comparison of resources consumed by different model training and test.

ModelEnvironmentTime of trainingTime of test

BERT-LSTMPython3.5/GPU204.3 s51.7 s
Word2Vec-LSTM198.6 s32.2 s
GRU247.1 s49.9 s
CNN279.5 s76.2 s

SVMPython3.5/CPU143.8 s18.2 s

BERT-LSTMPython2.7/CPU407.6 s142.6 s
Word2Vec-LSTM392.3 s123.1 s
CNN430.7 s158.7 s
GRU467.2 s182.9 s