Research Article
Using Graph Representation in Host-Based Intrusion Detection
| Require: graph , system call sequences , pattern weight function | | Ensure: adjacency , node index map | (1) | Initialization: Create an empty map , a zero matrix | (2) | index 0 | (3) | for each do: | (4) | | (5) | end for | (6) | for each do: | (7) | for to do: | (8) | | (9) | | (10) | | (11) | end for | (12) | end for | (13) | |
|