a defense mechanism to secure the network from anomalous activities. This paper presents
a comprehensive survey of methods and systems introduced by researchers in the past two
decades to protect network resources from intrusion. A detailed pros and cons analysis of
these methods and systems is also reported in this paper. Further, this paper also provides a
list of issues and research challenges in this evolving field of research. We believe that this …