Research Article

Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD

Figure 4

Configuration of training (a) LSTM, (b) GRU, and (c) CNN models for MalwarePlusClean data sample.
(a)
(b)
(c)