l In
an increasingly computerized and networked world, it is crucial to develop
defenses against malicious activity in information systems. One promising
approach is to develop computer algorithms that detect when someone is
inappropriately intruding on the computer of another person. However, intrusion
detection is a difficult problem to solve . Many Systems
have been developed for intrusion detection (IDS) ,Such as Snort ,Bro and BSM . There two general
approaches of detection, Such as misuse detection and abnormally detection
.However ,they both have some unavoidable disadvantages .Therefore One
promising approach is to develop a system which can make two approaches work
together.
l
l
l