Research Article
A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network
| Input: input sequence | | Output: prediction | (1) | while BatchNotFinished do | (2) | InitializeParameters(, , , ) | (3) | Connect the previous hidden state with the current input | (4) | Put the into forget layer, DELETE irrelevant data | (5) | Create a candidate layer using cell state | (6) | input layer, decide candidate layer data | (7) | Calculate the vector using forget, candidate and input layers | (8) | Calculate the current output | (9) | Update the new hidden state | (10) | end while | (11) | Output the prediction |
|