Research Article
Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment
Algorithm 1
The pseudo code of the data extraction algorithm.
| | Algorithm data extraction algorithm based on window | | | SamExtract (DA, , ) | | | Input: KDD CUP99 data set DA, window size , extraction threshold | | | Output: extracted data set DB | | (1) | Initialize sample counter ci = 0, , | | (2) | for k = 1 to |DA|/ do: | | (3) | for t = kw to (k + 1) do: | | (4) | if Tt = i then: | | (5) | ci = ci + 1 | | (6) | if ci ≥ then: | | (7) | Put the current window sample into DB and set the label as i | | (8) | end if | | (9) | end if | | (10) | ci = 0 | | (11) | end for | | (12) | return DB |
|