Research Article

Using Graph Representation in Host-Based Intrusion Detection

Algorithm 1

GenerateGraph .
Require: System call set , system call sequences
Ensure: graph
(1)Initialization: Create an empty graph
(2)for each do:
(3)  
(4)end for
(5)for each do:
(6)  for to do:
(7)    if and then
(8)      
(9)    end if
(10)  end for
(11)end for