Research Article

[Retracted] Computer Network Information Security Monitoring System Based on Big Data Era

Table 3

Logs’ log audit data table.

SequenceField nameField typeDefaultsIllustrate

1HostVarchar (32)NullUsername
2FacilityVarchar (10)NullEquipment
3PriorityVarchar (10)NullPriority
4LevelVarchar (10)NullLevels of danger
5TagVarchar (10)NullLogo
6MsgtextDescription of the content of the log
7Seqint (10)unsignedThe serial number of the storage log
8ProgramVarchar (15)Null
9DatedataNullStore the date the log was generated
10TimetimeNullStore the log generation time