Research Article

A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network

Algorithm 2

Anomaly detection.
Input: input sequence
Output: prediction
(1)while BatchNotFinished do
(2) InitializeParameters(, , , )
(3) Connect the previous hidden state with the current input
(4) Put the into forget layer, DELETE irrelevant data
(5) Create a candidate layer using cell state
(6)input layer, decide candidate layer data
(7) Calculate the vector using forget, candidate and input layers
(8) Calculate the current output
(9) Update the new hidden state
(10)end while
(11)Output the prediction