Skip to main content

Table 5 The Map phase input and output of the attack class event log

From: Situation prediction of large-scale Internet of Things network security

Map

INput

OUTput

Key

Row value

sourceIP&destIP&destPort&time

Value

log

1&logID&device&AttRule1/AttRule2/AttRule3/AttRule4