Research Article

[Retracted] Intrusion Detection Method Based on Deep Learning

Table 1

Data preprocessing procedure table.

Behavioral pathBehavioral pathBehavioral path

Source port and destination port of the change behaviorSource port and destination port of the change behaviorSource port and destination port of the change behavior
Alphabetic stringAlphabetic stringAlphabetic string
Behavioral objectBehavioral objectBehavioral object
Hostname of the behaviorHostname of the behaviorHostname of the behavior
Alphabetic stringAlphabetic stringAlphabetic string