Research Article
A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network
| | Input: input sequence | | | Output: prediction | | (1) | while BatchNotFinished do | | (2) | InitializeParameters(, , , ) | | (3) | Connect the previous hidden state with the current input | | (4) | Put the into forget layer, DELETE irrelevant data | | (5) | Create a candidate layer using cell state | | (6) | input layer, decide candidate layer data | | (7) | Calculate the vector using forget, candidate and input layers | | (8) | Calculate the current output | | (9) | Update the new hidden state | | (10) | end while | | (11) | Output the prediction |
|