Research Article
[Retracted] Intrusion Detection Method Based on Deep Learning
Table 1
Data preprocessing procedure table.
| Behavioral path | Behavioral path | Behavioral path |
| Source port and destination port of the change behavior | Source port and destination port of the change behavior | Source port and destination port of the change behavior | Alphabetic string | Alphabetic string | Alphabetic string | Behavioral object | Behavioral object | Behavioral object | Hostname of the behavior | Hostname of the behavior | Hostname of the behavior | Alphabetic string | Alphabetic string | Alphabetic string |
|
|