Research Article
[Retracted] Intrusion Detection Method Based on Deep Learning
Table 4
Compressed training sample data.
| ID | Behavior name (A) | Time of the act (B) | Behavioral agent (C) | Behavioral object (D) | Behavioral path (E) | Risk judgement |
| 1 | Select | Update | Update | Update | 0 | 1 | 4 | Insert | Insert | Insert | Insert | Select | 0 | ... | ... | ... | ... | ... | ... | ... |
|
|