Research Article
Design and Analysis of Network Virus Defense System Based on Multimodal Data Mining Technology
Table 3
Network operation log table.
| Column name | Type of data | Is it empty | Primary key |
| Operation start time | Long integer | No | Yes | Operation account IP address | Integer | No | No | Operation date | Long integer | No | No | Log name | Character type | Yes | No | Remark information | Date type | No | No | Operation object | Integer | No | Yes | Operation time | Character type | No | No | Log number | Long integer | Yes | Yes | Operation account | Character type | No | No |
|
|