Research Article

Using Graph Representation in Host-Based Intrusion Detection

Algorithm 5

ExtractSubGraph .
Require: full graph , system call sequence , node index map
Ensure: subgraph , adjacency
(1)
(2)
(3)Create a zero matrix
(4)for to do:
(5)  if and then
(6)    
(7)  end if
(8)end for
(9)
(10)
(11)