to a profitable underground cyber-crime economy and the availability of sophisticated tools
for launching such intrusions. Researchers in industry and academia have been proposing
methods and building systems for detecting and preventing such security breaches for more
than four decades. Solutions proposed for dealing with network intrusions can be broadly
classified as signature-based and anomaly-based. Signature-based intrusion detection …