Research Article

A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network

Algorithm 1

Log parser.
Input: log input
Output: sequence output
(1)Initialization (, , )
(2)Store to
(3)Read by STREAM
(4)Traverse the to find the largest common subsequence
(5)ifthen
(6) GOTO
(7)else
(8) GOTO
(9)end if
(10)Initialize the line of log into the list
(11)Update the line log
(12)Update the template
(13)GOTO