Research Article

GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection

Figure 3

Schematic layout of malicious traffic detection using GCN and GCN-ETA, respectively (a two-layer structure is used as an example).