|
Algorithm 4. Procedure D. Procedure (D): |
|
Input:
Output: Suspicious events detection 1. From Procedure C (step 2) 2. Set node’s internal intrusion dataset 3. Get at node ; sender or forwarding node 4. Call at Call IDS rule engine functions Start ; , Table 1. Validate Validate Validate 5. Start rule-based classification function, 6. Set event classifier logs for each node 7. Update the logs for each session 8. Redo for all channels |
| End of Procedure (D) |