Research Article

Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD

Table 3

Malware-type classification with the help of DL and SVM methods (AllMalware set).

CountAccuracy (percent)Classification time (seconds)
LSTMGRUCNNSVMLSTMGRUCNNSVM

1088.188.387.389.40.00009260.00008400.00004010.0000440
2088.888.189.089.40.00010430.00009940.00005100.0000583
4089.190.691.291.60.00013270.00013770.00006180.0000842
6088.290.591.291.90.00017860.00017040.00008900.0000848
8091.891.692.392.70.00021940.00022210.00011570.0000937
10091.691.992.892.40.00025590.00025660.00012900.0001165
20090.491.592.789.60.00044400.00043630.00030190.0002392
40087.690.393.087.30.00098400.00081420.00062220.0006739
60087.491.493.186.10.00234430.00230520.00166810.0015564
80082.188.593.084.70.00431590.00378940.00239290.0022612
100075.589.693.183.20.00680750.00561590.00332760.0032245