Research Article
Using Graph Representation in Host-Based Intrusion Detection
| | Require: System call set , system call sequences | | | Ensure: graph | | (1) | Initialization: Create an empty graph | | (2) | for each do: | | (3) | | | (4) | end for | | (5) | for each do: | | (6) | for to do: | | (7) | if and then | | (8) | | | (9) | end if | | (10) | end for | | (11) | end for |
|