Research Article
A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network
| | Input: log input | | | Output: sequence output | | (1) | Initialization (, , ) | | (2) | Store to | | (3) | Read by STREAM | | (4) | Traverse the to find the largest common subsequence | | (5) | ifthen | | (6) | GOTO | | (7) | else | | (8) | GOTO | | (9) | end if | | (10) | Initialize the line of log into the list | | (11) | Update the line log | | (12) | Update the template | | (13) | GOTO |
|