Research Article
On Detecting and Removing Superficial Redundancy in Vector Databases
Table 2
Example of a vector database.
| Attacker Region Code | Attacker Port | Source Region Code | Source Port | Target Port | Target Region Code | Target Type IP | Time Stamp |
| 35 | 137 | 35 | 137 | | 45 | static | 23:56:24 | 56 | 1456 | 56 | 1456 | | 45 | static | 23:56:39 | 67 | 1456 | 67 | 1456 | | 45 | dynamic | 23:57:02 | 67 | 378 | 67 | 378 | | 45 | dynamic | 23:57:43 |
|
|