Research Article
[Retracted] Anomaly Intrusion Detection of Wireless Communication Network-Based on Markov Chain Model
Table 3
Syslog attack detection results.
| File name (.int) | Total number of system calls | Number of system call numbers | Location system call number |
| Sysiog-local-1 | 1520 | 45 | 84, 52, 36 | Sysiog-local-2 | 1583 | 52 | 84, 52, 36 | Sysiog-remote-1 | 1867 | 48 | 84, 52, 36 | Sysiog-remote-2 | 1558 | 43 | 84, 52 |
|
|