Research Article
A Novel Approach for Malicious URL Detection Based on the Joint Model
Table 4
The influence of each algorithm on the experimental results.
| Total | ACC (%) | P (%) | R (%) | F (%) |
| Attention | 99.58 | 99.7 | 99.44 | 99.57 | CapsNet | 99.74 | 99.52 | 99.96 | 99.74 | CNN | 99.62 | 99.7 | 99.1 | 99.62 | LSTM | 99.65 | 99.8 | 99.49 | 99.64 | Bi-LSTM | 99.74 | 99.58 | 99.89 | 99.73 | IndRNN | 99.52 | 99.59 | 99.44 | 99.52 | Bi-IndRNN | 99.68 | 99.43 | 99.93 | 99.68 | Our | 99.89 | 99.83 | 99.95 | 99.89 |
|
|