Research Article
Using Graph Representation in Host-Based Intrusion Detection
| | Require: sub graph , node index map , adjacency | | | Ensure: vector | | (1) | Initialization: create zero vector which has elements; | | (2) | | | (3) | while true do | | (4) | | | (5) | fordo: | | (6) | | | (7) | | | (8) | update | | (9) | | | (10) | end for | | (11) | ifthen | | (12) | break; | | (13) | end if | | (14) | end while | | (15) | |
|