Skip to main content

Advertisement

Table 6 The Reduce phase input and output of the attack class event log

From: Situation prediction of large-scale Internet of Things network security

Reduce INput OUTput
Key sourceIP&destIP&destPort&time sourceIP&destIP&destPort&time
Value 1&logID&device&AttRule1/AttRule2/AttRule3/AttRule4 n&logID&device&AttRule1/AttRule2/AttRule3/AttRule4