Research Article
Using Graph Representation in Host-Based Intrusion Detection
| | Require: graph , start node , walk length , node index map , node transition probability matrix | | | Ensure: walk path from node | | (1) | | | (2) | | | (3) | whiledo: | | (4) | | | (5) | | | (6) | ifthen | | (7) | | | (8) | else | | (9) | | | (10) | end if | | (11) | end while |
|