attempt to detect and prevent individual attacks. However, it is not the attack but rather the
attacker against which our networks must be defended. To do this, the information that is
being provided by intrusion detection systems (IDS) must be gathered and then divided into
its component parts such that the activity of individual attackers is made clear. Our approach
to this involves the application of Bayesian methods to data being gathered from distributed …