ABSTRACT

With the rapid development of network technology, the need for and the dependency on networks, such as online services, have been definitely increased, which has also given rise to new vulnerabilities and threats (e.g., worms, Trojans, viruses). For example, the Internet has already become an important component of business models [1]; thus, many business operations should use Internet applications, such as e-banking and online transfers. To protect business and personal networks, intrusion detection is one major challenge for both research and practice.