Skip to main content

Advertisement

Table 5 The Map phase input and output of the attack class event log

From: Situation prediction of large-scale Internet of Things network security

Map INput OUTput
Key Row value sourceIP&destIP&destPort&time
Value log 1&logID&device&AttRule1/AttRule2/AttRule3/AttRule4