From: Situation prediction of large-scale Internet of Things network security
Map
INput
OUTput
Key
Row value
sourceIP&destIP&destPort&time
Value
log
1&logID&device&AttRule1/AttRule2/AttRule3/AttRule4