Research Article
Malicious Encryption Traffic Detection Based on NLP
Table 1
General situation of each classifier.
| Data processing method | Classifier | Characteristics |
| TF-IDF | Gradient boosting | Slight time, a bit poor result | Random forest | AdaBoost | Long time, a bit good result | Ensemble learning | TF-IDF + SVD | CNN |
|
|