Research Article

[Retracted] Intrusion Detection Method Based on Deep Learning

Table 4

Compressed training sample data.

IDBehavior name (A)Time of the act (B)Behavioral agent (C)Behavioral object (D)Behavioral path (E)Risk judgement

1SelectUpdateUpdateUpdate01
4InsertInsertInsertInsertSelect0
.....................