Research Article
Using Graph Representation in Host-Based Intrusion Detection
| | Require: full graph , system call sequence , node index map | | | Ensure: subgraph , adjacency | | (1) | | | (2) | | | (3) | Create a zero matrix | | (4) | for to do: | | (5) | if and then | | (6) | | | (7) | end if | | (8) | end for | | (9) | | | (10) | | | (11) | |
|