Research Article

A Deep Random Forest Model on Spark for Network Intrusion Detection

Algorithm 3.

Hierarchical replacement.
Input: : cache collection of RDD, : cluster cache size, : cached RDD size, : cache candidate, : size of candidate.
Output:
(1)calc ;
(2)IntegrityCheck (rdds);
(3);
(4)if ()
(5)for ((k,))
(6)  if ( = = FALSE)
(7)  Replace (k = , = TRUE)
(8)  end if
(9)end for
(10)if ()
(11)  
(12)else
(13)  for ((k,))
(14)  v.QuickSort ();//Sort by execution efficiency
(15)  if (<)
(16)  Replace (k = ,  = )
(17)  end if
(18)end for
(19)  
(20)end if
(21)end if