Research Article
Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment
Algorithm 1
The pseudo code of the data extraction algorithm.
| Algorithm data extraction algorithm based on window | | SamExtract (DA, , ) | | Input: KDD CUP99 data set DA, window size , extraction threshold | | Output: extracted data set DB | (1) | Initialize sample counter ci = 0, , | (2) | for k = 1 to |DA|/ do: | (3) | for t = kw to (k + 1) do: | (4) | if Tt = i then: | (5) | ci = ci + 1 | (6) | if ci ≥ then: | (7) | Put the current window sample into DB and set the label as i | (8) | end if | (9) | end if | (10) | ci = 0 | (11) | end for | (12) | return DB |
|