You have to log in to reply this question. Anomaly-based intrusion detection techniques ended up principally launched to detect unfamiliar attacks, in part due to the fast improvement of malware. The essential solution is to use equipment Discovering to make a design of dependable activity, and after that Evaluate new behavior versus this des