Research Article

[Retracted] Intrusion Detection Method Based on Deep Learning

Table 3

Preconditioning training set.

IDBehavior name (A)Time of the act (B)Behavioral agent (C)Behavioral object (D)Behavioral path (E)Risk judgement

1SelectUpdateUpdateUpdate01
20Select00Update1
30UpdateUpdate000
4InsertInsertInsertInsertSelect0
.....................