The
tremendous growth of the usage of computers over network and development in
application running on a various platform captures the attention towards
network security. This paradigm exploits security vulnerabilities on all
computer systems that are technically
difficult and expensive to be solved. As
a result, Intrusion Detection Systems (IDSs), are widely used to detect and
stop network intrusions [1,2]. An intrusion detection system watches networked
devices & searches for malicious behaviors in kinds of pattern in the audit
stream [13]. One main conflict in intrusion detection [3] is that we have to
find out the hidden attacks from a large quantity of routine communication
activities. The security of our computer systems & data is at continual
risks due to the extensive...