1) The document proposes an approach to intrusion detection based on runtime verification by running monitors on every suffix of an event stream to detect multiple instances of patterns.
2) It describes techniques to prune redundant monitors by discarding those that remain in the initial state after the first event or reach the same state at the same step.
3) Retaining only the "progressing subsequence" of the stream that visits each new state in order further reduces the number of matches.
Related topics: