Detecting Intrusions through System Call Sequence and Argument Analysis