Research Article
Using Graph Representation in Host-Based Intrusion Detection
| | Require: graph , system call sequences , pattern weight function | | | Ensure: adjacency , node index map | | (1) | Initialization: Create an empty map , a zero matrix | | (2) | index 0 | | (3) | for each do: | | (4) | | | (5) | end for | | (6) | for each do: | | (7) | for to do: | | (8) | | | (9) | | | (10) | | | (11) | end for | | (12) | end for | | (13) | |
|