Research Article

A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network

Table 2

Hardware and software environment.

No.TypeDescription

1OS and versionUbuntu 20.04
2Experiment platformTensorflow 2.0
3CPUIntel Core-i7 9700 K
4Units of CPU8 cores 8 threads
5MemoryDDR4 32 GB
6Graphics cardGTX1070 8 GB
7Storage2 TB Nvme SSD