Research Article
[Retracted] Anomaly Intrusion Detection of Wireless Communication Network-Based on Markov Chain Model
Table 1
Normal system call sequence.
| Call | Position 1 | Position 2 | Position 3 |
| Open | Read | Mmap | Mmap | Getrlimit | | Close | Read | Mmap | Mmap | Open | Mmap | Mmap | Open | Getrlimit | Open | Getrlimit | Mmap | Getrlimit | Close | | | Close | Mmap | Close | |
|
|