ABSTRACT

With the expansion of Internet and its importance, the types and number of the attacks have also grown making intrusion detection an increasingly important technology. Most of the existing solutions are developed for well-defined networks and systems [1,2]. Nevertheless, they are not adapted to dynamic environments, or to the increasing complexity of user behaviors.