Intrusion detection is an efficient way to protect information system. This paper explains a new anomalous intrusion detection method. It uses system calls as input, and creates a FSA for the functions in the program. Then the FSA is used to detect the attack. It finds the place where the vulnerability exists in the program. This can help alter the source program. Experiment proves...