Research Article
A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network
| Input: log input | | Output: sequence output | (1) | Initialization (, , ) | (2) | Store to | (3) | Read by STREAM | (4) | Traverse the to find the largest common subsequence | (5) | ifthen | (6) | GOTO | (7) | else | (8) | GOTO | (9) | end if | (10) | Initialize the line of log into the list | (11) | Update the line log | (12) | Update the template | (13) | GOTO |
|