Research Article
Using Graph Representation in Host-Based Intrusion Detection
| Require: System call set , system call sequences | | Ensure: graph | (1) | Initialization: Create an empty graph | (2) | for each do: | (3) | | (4) | end for | (5) | for each do: | (6) | for to do: | (7) | if and then | (8) | | (9) | end if | (10) | end for | (11) | end for |
|