Skip to main content

Table 6 The Reduce phase input and output of the attack class event log

From: Situation prediction of large-scale Internet of Things network security

Reduce

INput

OUTput

Key

sourceIP&destIP&destPort&time

sourceIP&destIP&destPort&time

Value

1&logID&device&AttRule1/AttRule2/AttRule3/AttRule4

n&logID&device&AttRule1/AttRule2/AttRule3/AttRule4