Research Article
BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks
Figure 4
A detailed view of the classifier. -grams are extracted from the input application layer message, which are then used to train an RNN model to classify whether the connection is malicious or benign.