I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l
.
9
,
No
.
6
,
Dec
em
b
er
201
9
,
p
p
.
4
9
5
1
~4
9
60
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v9
i
6
.
p
p
4
9
5
1
-
4960
4951
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e
.
co
m/
jo
u
r
n
a
ls
/in
d
ex
.
p
h
p
/
I
JE
C
E
An ada
ptive dis
tr
ibuted
i
ntrusio
n
d
etec
tion
sy
ste
m
ar
chitec
ture
using
m
ulti
a
g
ent
s
Riy
a
d A
.
M
.
1
,
M.
S
.
I
rf
a
n Ah
m
ed
2
, R
.
L
.
Ra
hee
m
a
a
K
ha
n
3
1
De
p
a
rt
m
e
n
t
o
f
Co
m
p
u
ter S
c
ien
c
e
,
EM
EA
Co
ll
e
g
e
o
f
A
rts
a
n
d
S
c
i
e
n
c
e
,
In
d
ia
2
,3
De
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter A
p
p
li
c
a
ti
o
n
s,
Ne
h
r
u
In
st
it
u
te
o
f
En
g
in
e
e
rin
g
a
n
d
T
e
c
h
n
o
l
o
g
y
,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
u
n
2
9
,
2
0
1
8
R
ev
i
s
ed
Ma
y
1
0
,
201
9
A
cc
ep
ted
J
u
n
26
,
2
0
1
9
In
tru
si
o
n
d
e
tec
ti
o
n
sy
ste
m
s a
re
u
s
e
d
f
o
r
m
o
n
it
o
rin
g
th
e
n
e
tw
o
rk
d
a
ta,
a
n
a
ly
z
e
th
e
m
a
n
d
f
in
d
th
e
in
tru
sio
n
s
if
a
n
y
.
T
h
e
m
a
jo
r
issu
e
s
w
it
h
th
e
se
s
y
ste
m
s
a
re
th
e
ti
m
e
tak
e
n
f
o
r
a
n
a
ly
sis,
tran
s
fe
r
o
f
b
u
lk
d
a
ta
f
ro
m
o
n
e
p
a
rt
o
f
th
e
n
e
tw
o
rk
to
a
n
o
t
h
e
r,
h
ig
h
f
a
lse
p
o
siti
v
e
s
a
n
d
a
d
a
p
ta
b
il
it
y
to
th
e
f
u
tu
re
th
re
a
ts.
T
h
e
se
issu
e
s
a
re
a
d
d
re
ss
e
d
h
e
re
b
y
d
e
v
isin
g
a
f
ra
m
e
w
o
rk
f
o
r
in
tru
si
o
n
d
e
tec
ti
o
n
.
He
re
,
v
a
rio
u
s
ty
p
e
s
o
f
c
o
-
o
p
e
ra
ti
n
g
a
g
e
n
ts
a
re
d
istri
b
u
ted
in
th
e
n
e
tw
o
rk
f
o
r
m
o
n
it
o
rin
g
,
a
n
a
l
y
z
in
g
,
d
e
tec
ti
n
g
a
n
d
re
p
o
rti
n
g
.
A
n
a
l
y
sis
a
n
d
d
e
tec
ti
o
n
a
g
e
n
ts
a
re
th
e
m
o
b
il
e
a
g
e
n
ts
w
h
ich
a
re
t
h
e
p
rim
a
r
y
d
e
te
c
ti
o
n
m
o
d
u
les
f
o
r
d
e
tec
ti
n
g
in
tru
si
o
n
s.
T
h
e
ir
m
o
b
il
it
y
e
li
m
in
a
tes
th
e
tran
s
f
e
r
o
f
b
u
lk
d
a
ta
f
o
r
p
ro
c
e
ss
in
g
.
A
n
a
l
g
o
rit
h
m
n
a
m
e
d
territo
ry
is
p
ro
p
o
s
e
d
t
o
a
v
o
id
in
terf
e
re
n
c
e
o
f
o
n
e
a
n
a
ly
sis
a
g
e
n
t
w
it
h
a
n
o
th
e
r
o
n
e
.
A
c
o
m
m
u
n
ica
ti
o
n
lay
o
u
t
o
f
th
e
a
n
a
ly
sis
a
n
d
d
e
tec
ti
o
n
m
o
d
u
le
w
it
h
o
t
h
e
r
m
o
d
u
les
is
d
e
p
icte
d
.
T
h
e
in
ter
-
a
g
e
n
t
c
o
m
m
u
n
ica
ti
o
n
re
d
u
c
e
s
th
e
f
a
lse
p
o
siti
v
e
s
sig
n
if
ica
n
tl
y
.
It
a
lso
f
a
c
il
it
a
tes
th
e
id
e
n
ti
f
ica
ti
o
n
o
f
d
istri
b
u
ted
t
y
p
e
s
o
f
a
tt
a
c
k
s.
T
h
e
c
o
-
o
rd
i
n
a
to
r
a
g
e
n
ts
lo
g
v
a
rio
u
s
e
v
e
n
ts
a
n
d
su
m
m
a
riz
e
th
e
a
c
ti
v
it
ies
in
it
s
n
e
tw
o
rk
.
It
a
lso
c
o
m
m
u
n
ica
tes
w
it
h
c
o
-
o
rd
i
n
a
to
r
a
g
e
n
ts
o
f
o
th
e
r
n
e
tw
o
rk
s.
T
h
e
s
y
ste
m
is
h
ig
h
ly
sc
a
lab
le
b
y
in
c
re
a
sin
g
th
e
n
u
m
b
e
r
o
f
v
a
rio
u
s
a
g
e
n
ts
i
f
n
e
e
d
e
d
.
Ce
n
tralize
d
p
r
o
c
e
ss
in
g
is
a
v
o
id
e
d
h
e
re
t
o
e
v
a
d
e
sin
g
le
p
o
i
n
t
o
f
f
a
il
u
re
.
W
e
c
r
e
a
ted
a
p
ro
to
ty
p
e
a
n
d
th
e
e
x
p
e
ri
m
e
n
ts
d
o
n
e
g
a
v
e
v
e
r
y
p
ro
m
isin
g
re
su
lt
s sh
o
w
in
g
th
e
e
f
f
e
c
ti
v
e
n
e
ss
o
f
th
e
sy
st
e
m
.
K
ey
w
o
r
d
s
:
Data
m
i
n
i
n
g
D
is
tr
ib
u
ted
ag
e
n
t
s
I
n
tr
u
s
io
n
d
etec
tio
n
s
y
s
te
m
J
A
DE
Net
w
o
r
k
s
ec
u
r
i
ty
Co
p
y
rig
h
t
©
2
0
1
9
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
R
i
y
ad
A
.
M
.
,
Dep
ar
t
m
en
t o
f
C
o
m
p
u
ter
Scie
n
ce
,
E
ME
A
C
o
lleg
e
o
f
A
r
t
s
an
d
Sc
ien
ce
,
Ku
m
m
in
ip
ar
a
m
ab
a
(
P
O)
,
Ko
n
d
o
tty
,
Ma
lap
p
u
r
a
m
Dis
tr
ict,
Ker
ala,
6
7
3
6
3
8
-
I
n
d
ia.
E
m
ail: a
m
r
i
y
ad
@
y
a
h
o
o
.
co
m
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
th
r
ea
ts
t
h
r
o
u
g
h
t
h
e
n
et
wo
r
k
r
aise
b
ig
co
n
ce
r
n
s
to
t
h
e
d
a
y
to
d
a
y
ac
ti
v
ities
in
t
h
e
co
m
p
u
ter
n
et
w
o
r
k
.
I
t
h
a
s
b
ee
n
a
v
er
y
c
h
allen
g
in
g
ta
s
k
f
o
r
th
e
s
ec
u
r
it
y
an
al
y
s
ts
a
n
d
ad
m
i
n
i
s
tr
ato
r
s
f
o
r
a
v
er
y
lo
n
g
ti
m
e.
Var
io
u
s
h
ar
d
w
ar
e
an
d
s
o
f
t
w
ar
e
s
y
s
te
m
s
ar
e
b
ein
g
d
ep
lo
y
ed
f
o
r
eli
m
in
a
tin
g
in
tr
u
s
io
n
s
.
A
s
y
s
te
m
is
s
aid
to
b
e
s
ec
u
r
e
i
f
t
h
e
co
n
f
id
e
n
tialit
y
,
in
te
g
r
it
y
an
d
a
v
ailab
ilit
y
i
s
m
ai
n
tai
n
ed
[
1
]
.
I
n
tr
u
s
io
n
d
etec
tio
n
s
y
s
te
m
s
ar
e
b
eliev
ed
to
b
e
t
h
e
la
s
t
lin
e
o
f
d
ef
en
s
e
i
n
t
h
e
n
et
w
o
r
k
s
ec
u
r
it
y
.
T
h
ese
ar
e
th
e
s
y
s
te
m
s
w
h
ic
h
m
o
n
i
to
r
s
,
an
al
y
ze
an
d
f
in
d
ab
n
o
r
m
al
p
atter
n
s
.
T
h
e
p
atter
n
s
m
a
y
r
e
s
e
m
b
le
a
p
r
ev
io
u
s
l
y
k
n
o
w
n
s
ig
n
at
u
r
e
o
r
it
m
a
y
b
e
a
n
e
w
attac
k
.
I
t
is
th
e
in
te
lli
g
en
ce
o
f
an
in
tr
u
s
io
n
d
etec
tio
n
s
y
s
te
m
(
I
DS)
to
id
en
tify
w
h
et
h
er
it
is
an
attac
k
o
r
n
o
t.
Failin
g
i
n
th
is
ca
n
in
cr
ea
s
e
t
h
e
f
alse p
o
s
iti
v
es a
n
d
f
al
s
e
n
e
g
at
iv
es.
Her
e,
w
e
ad
d
r
ess
t
h
e
s
er
io
u
s
p
r
o
b
lem
s
p
r
ev
aili
n
g
w
i
th
r
e
s
p
ec
t
to
t
h
e
c
u
r
r
en
t
in
tr
u
s
io
n
d
etec
tio
n
s
y
s
te
m
s
.
T
h
e
I
DS
ar
e
u
s
u
a
ll
y
ce
n
tr
alize
d
in
n
a
tu
r
e
at
leas
t
w
it
h
r
esp
ec
t
to
p
r
o
ce
s
s
in
g
o
f
d
ata.
T
h
is
lea
d
s
to
s
in
g
le
p
o
in
t
o
f
f
ail
u
r
e.
Mo
r
eo
v
er
,
it
u
s
u
all
y
f
ail
s
m
is
er
ab
l
y
i
n
d
is
tr
ib
u
ted
t
y
p
es
o
f
atta
ck
s
li
k
e
d
is
tr
ib
u
ted
d
en
ial
o
f
s
er
v
ice.
L
ea
r
n
i
n
g
t
h
e
en
tire
n
et
w
o
r
k
an
d
ac
tin
g
ac
co
r
d
in
g
l
y
i
s
a
v
er
y
ted
io
u
s
t
ask
f
o
r
a
ce
n
tr
alize
d
s
y
s
te
m
a
n
d
ev
e
n
f
o
r
th
e
d
is
t
r
i
b
u
ted
o
n
es
w
ith
o
u
t
a
p
r
o
p
er
f
r
a
m
e
w
o
r
k
.
I
t
u
s
u
all
y
n
ee
d
s
to
m
o
v
e
b
u
l
k
a
m
o
u
n
t
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
9
,
No
.
6
,
Dec
em
b
er
2
0
1
9
:
4
9
5
1
-
496
0
4952
o
f
d
ata
f
r
o
m
o
n
e
p
lace
to
an
o
th
er
f
o
r
an
al
y
s
i
s
w
h
ich
in
t
u
r
n
i
n
cr
ea
s
e
t
h
e
n
et
w
o
r
k
lo
a
d
.
I
t
d
o
esn
’
t
h
av
e
th
e
s
u
p
p
o
r
t
o
f
o
th
er
s
i
m
ilar
en
titi
e
s
to
k
n
o
w
a
n
y
p
r
ev
io
u
s
l
y
lear
n
t
i
n
f
o
r
m
a
tio
n
i
n
t
h
e
n
et
w
o
r
k
.
T
h
is
ca
n
in
cr
ea
s
e
f
alse
p
o
s
i
tiv
e
s
.
Si
n
c
e
th
e
d
etec
tio
n
co
m
p
o
n
e
n
ts
a
r
e
less
i
n
m
o
s
t
o
f
th
e
I
D
Ss
,
th
e
ti
m
e
ta
k
e
n
f
o
r
an
al
y
s
is
i
s
also
h
i
g
h
er
.
A
d
ap
tab
ilit
y
to
th
e
n
e
w
s
ce
n
ar
io
s
is
also
d
if
f
icu
lt
d
u
e
to
th
e
a
b
s
en
ce
o
f
a
p
r
o
p
e
r
f
r
a
m
e
w
o
r
k
w
i
t
h
co
m
p
o
n
e
n
ts
t
h
at
ca
n
co
m
m
u
n
icate
s
ea
m
le
s
s
l
y
.
A
ll
th
e
is
s
u
e
s
id
en
ti
f
ied
ab
o
v
e
co
n
f
ir
m
t
h
e
n
ec
e
s
s
i
t
y
f
o
r
p
r
o
p
o
s
in
g
a
p
r
o
p
er
d
is
tr
ib
u
ted
in
tr
u
s
io
n
d
etec
tio
n
s
y
s
te
m
ar
c
h
itect
u
r
e
w
it
h
v
ar
io
u
s
co
m
p
o
n
e
n
ts
t
h
at
ca
n
s
o
lv
e
th
e
ex
is
ti
n
g
co
n
ce
r
n
s
[
2
]
.
I
n
o
r
d
er
to
de
v
elo
p
s
u
c
h
an
in
tr
u
s
io
n
d
e
tectio
n
s
y
s
te
m
,
w
e
u
s
ed
th
e
s
u
p
p
o
r
t
o
f
m
o
b
ile
a
g
e
n
ts
[
3
,
4
]
.
E
v
en
I
DS
w
i
th
m
o
b
ile
a
g
e
n
ts
co
u
ld
b
e
a
f
ail
u
r
e
if
t
h
e
y
ar
e
n
o
t
d
ep
lo
y
ed
i
n
a
p
lan
n
ed
m
a
n
n
er
.
A
w
ell
p
lan
n
ed
f
r
a
m
e
w
o
r
k
w
it
h
v
ar
io
u
s
m
o
b
ile
ag
e
n
ts
a
n
d
w
ell
s
u
p
p
o
r
ted
co
o
r
d
in
ato
r
ag
en
t
ca
n
r
eso
lv
e
t
h
e
cu
r
r
en
t
is
s
u
e
s
in
in
tr
u
s
io
n
d
etec
tio
n
s
y
s
te
m
s
.
A
m
o
b
ile
a
g
en
t
i
s
a
p
r
o
g
r
am
w
it
h
its
d
ata
w
h
ich
is
ca
p
ab
le
o
f
m
ig
r
ati
n
g
f
r
o
m
o
n
e
h
o
s
t
to
an
o
th
er
a
n
d
co
n
ti
n
u
es
i
ts
e
x
ec
u
tio
n
in
an
a
u
to
n
o
m
o
u
s
f
as
h
i
o
n
.
T
h
is
is
th
e
s
tr
i
k
i
n
g
f
ea
t
u
r
e
o
f
a
n
ag
e
n
t
w
h
ic
h
ca
n
b
e
u
tili
ze
d
in
I
D
S
f
o
r
m
o
v
in
g
t
h
e
p
r
o
ce
s
s
to
th
e
d
ata
r
ath
er
th
a
n
m
o
v
i
n
g
d
ata
to
th
e
p
r
o
ce
s
s
f
o
r
an
al
y
s
is
th
at
i
n
cr
ea
s
es
t
h
e
n
et
w
o
r
k
tr
af
f
ic
lo
ad
.
Sin
ce
t
h
e
ag
e
n
ts
a
r
e
au
to
n
o
m
o
u
s
i
n
n
at
u
r
e
n
o
u
s
er
i
n
ter
v
e
n
tio
n
i
s
n
ee
d
ed
f
o
r
its
f
u
n
cti
o
n
i
n
g
.
T
h
e
y
ar
e
also
p
r
o
-
ac
tiv
e
in
n
a
t
u
r
e
an
d
ca
n
tak
e
n
ec
e
s
s
ar
y
p
r
ev
en
t
iv
e
ac
tio
n
s
o
n
th
e
ev
e
n
t
s
th
at
ca
n
lead
to
in
t
r
u
s
io
n
s
.
T
h
e
in
ter
ac
tio
n
ca
p
ab
ilit
y
w
i
th
o
t
h
er
ag
e
n
ts
h
elp
s
i
n
f
a
s
t
an
a
l
y
s
is
a
n
d
d
ec
is
io
n
m
ak
i
n
g
.
A
s
th
e
n
u
m
b
er
o
f
ag
en
ts
ca
n
ea
s
il
y
b
e
i
n
cr
ea
s
ed
w
it
h
t
h
e
i
n
cr
ea
s
i
n
g
lo
ad
o
f
th
e
n
et
w
o
r
k
,
th
e
s
y
s
te
m
i
s
ea
s
il
y
s
ca
lab
le.
Mo
r
eo
v
er
,
th
er
e
is
n
o
s
i
n
g
le
p
o
in
t
o
f
f
ai
lu
r
e.
Fa
u
lt
to
ler
an
ce
is
h
i
g
h
s
i
n
ce
o
n
e
ag
en
t
ca
n
s
u
b
s
tit
u
te
a
n
o
th
er
if
n
ee
d
ed
.
P
ar
allel
an
al
y
s
i
s
o
f
t
h
e
e
v
en
t
s
ca
n
b
e
ac
h
iev
ed
u
s
i
n
g
m
u
lt
ip
le
ag
e
n
t
s
w
h
ic
h
r
ed
u
ce
th
e
ti
m
e
ta
k
en
f
o
r
an
al
y
s
i
s
s
i
g
n
if
ican
t
l
y
.
Ha
n
d
lin
g
o
f
d
u
p
licate
aler
ts
f
r
o
m
s
a
m
e
e
v
en
t
ca
n
b
e
d
is
ca
r
d
ed
b
y
p
r
o
p
er
co
o
r
d
in
ato
n
b
et
w
ee
n
t
h
e
a
g
en
t
s
.
T
h
is
ex
ten
s
i
v
el
y
r
ed
u
ce
s
f
a
ls
e
p
o
s
i
tiv
e
alar
m
s
[
5
,
6
]
.
Mo
r
eo
v
er
,
an
u
n
id
en
tifie
d
n
o
v
el
attac
k
d
u
e
to
th
e
s
p
ac
i
al
li
m
itat
io
n
s
o
f
a
d
etec
tio
n
co
m
p
o
n
e
n
t
ca
n
b
e
d
is
co
v
er
ed
b
y
th
e
co
o
r
d
in
ate
d
ef
f
o
r
t
o
f
v
ar
io
u
s
co
m
p
o
n
e
n
ts
i
n
t
h
e
d
etec
tio
n
f
r
a
m
e
w
o
r
k
[
7
,
8
]
.
A
n
o
v
e
l
ar
ch
itect
u
r
e
is
p
r
o
p
o
s
ed
h
er
e
th
at
ca
n
r
eso
lv
e
th
e
cu
r
r
e
n
t
i
s
s
u
es
o
f
th
e
e
x
i
s
t
i
n
g
I
D
S.
W
e
u
s
e
J
A
DE
en
v
ir
o
n
m
e
n
t
f
o
r
d
ep
lo
y
i
n
g
m
u
ltip
le
ag
en
ts
f
o
r
in
tr
u
s
io
n
d
ete
ctio
n
.
T
h
e
r
est
o
f
th
e
p
ap
er
is
o
r
g
an
ized
as
f
o
llo
w
s
.
Sectio
n
2
d
etails
th
e
r
elate
d
liter
atu
r
e
s
d
o
n
e
o
n
ag
en
t
b
ased
d
i
s
tr
ib
u
ted
in
tr
u
s
io
n
d
et
ec
tio
n
,
S
ec
tio
n
3
d
escr
ib
es
th
e
p
r
o
p
o
s
ed
ar
ch
it
ec
tu
r
e
in
w
h
ich
th
e
I
D
S
w
o
r
k
s
,
S
ec
tio
n
4
ex
p
lai
n
s
th
e
co
m
m
u
n
icat
io
n
m
o
d
el
o
f
an
a
l
y
s
i
s
an
d
d
etec
tio
n
a
g
e
n
t
t
h
r
o
u
g
h
w
h
ich
th
e
a
g
e
n
t
in
ter
ac
ts
w
i
th
o
th
er
e
n
titi
e
s
,
s
ec
tio
n
5
d
is
cu
s
s
es
o
n
t
h
e
i
m
p
l
e
m
en
tatio
n
a
n
d
th
e
r
esu
lts
o
b
tain
ed
an
d
S
ec
tio
n
6
co
n
clu
d
es t
h
e
p
ap
er
.
2.
RE
L
AT
E
D
WO
RK
S
Net
w
o
r
k
s
ec
u
r
it
y
is
all
ab
o
u
t
ass
u
r
i
n
g
a
v
ailab
ili
t
y
,
i
n
teg
r
it
y
an
d
co
n
f
id
en
tialit
y
f
o
r
cr
itical
in
f
o
r
m
atio
n
.
T
h
e
co
n
ce
p
t
o
f
i
n
tr
u
s
io
n
d
etec
tio
n
w
a
s
in
tr
o
d
u
ce
d
b
y
J
a
m
es
P
An
d
er
s
o
n
.
I
n
1
9
8
0
h
e
p
u
b
lis
h
ed
a
tech
n
ical
r
ep
o
r
t
o
n
in
tr
u
s
io
n
d
etec
tio
n
s
y
s
te
m
s
.
Her
e,
h
e
d
i
s
cu
s
s
ed
ab
o
u
t
h
o
s
t
b
ased
au
d
i
t
d
ata
an
d
lo
g
s
[
9
]
.
I
n
tr
u
s
io
n
d
etec
tio
n
ca
n
b
e
an
o
m
al
y
b
ased
,
m
i
s
u
s
e
b
ased
o
r
c
o
m
b
i
n
atio
n
al
ap
p
r
o
ac
h
[
1
0
]
.
Misu
s
e
d
etec
tio
n
is
co
n
d
u
cted
w
it
h
t
h
e
h
elp
o
f
p
r
ev
io
u
s
l
y
av
ai
lab
le
s
ig
n
at
u
r
es
o
f
k
n
o
w
n
attac
k
s
.
On
t
h
e
o
th
er
h
an
d
,
an
o
m
a
l
y
d
etec
tio
n
is
d
o
n
e
b
y
n
o
tic
in
g
t
h
e
d
ev
iatio
n
s
f
r
o
m
n
o
r
m
al
b
eh
av
io
r
s
.
I
n
co
n
v
en
t
io
n
al
ap
p
r
o
ac
h
f
o
r
in
tr
u
s
io
n
d
etec
tio
n
,
a
ce
n
tr
a
l
I
DS
m
o
n
ito
r
s
t
h
e
e
n
tire
n
e
t
w
o
r
k
f
o
r
d
etec
tin
g
i
n
tr
u
s
io
n
.
T
h
is
lead
s
to
v
ar
io
u
s
d
r
a
w
b
ac
k
s
w
h
ic
h
g
a
v
e
w
a
y
to
m
o
r
e
v
er
s
atile
d
is
tr
ib
u
ted
i
n
tr
u
s
io
n
d
etec
tio
n
s
y
s
te
m
s
[
1
1
]
.
T
h
e
h
ier
ar
ch
ical
ar
r
an
g
e
m
e
n
t
o
f
v
ar
i
o
u
s
en
titi
es
o
f
I
DS
i
s
also
a
d
r
a
w
b
ac
k
b
ec
au
s
e
a
co
m
p
r
o
m
is
ed
n
o
d
e
u
p
in
th
e
h
ier
ar
ch
y
ca
n
b
r
in
g
d
o
w
n
th
e
en
tire
s
ec
u
r
it
y
s
y
s
te
m
.
H
e
n
ce
,
in
a
co
u
p
le
o
f
d
ec
ad
es
it
h
av
e
b
ee
n
id
en
tif
i
ed
th
at,
th
e
s
in
g
le
I
DS
s
ce
n
ar
io
n
ee
d
s
to
b
e
r
e
p
lace
d
w
i
th
d
is
tr
ib
u
ted
I
DS.
T
h
e
p
r
esen
t
I
DS
s
h
o
u
ld
b
e
ca
p
ab
le
o
f
d
etec
tin
g
d
is
tr
ib
u
ted
attac
k
s
.
So
m
e
o
f
th
e
m
ar
e
co
o
r
d
in
ated
o
n
es
[
1
2
]
.
T
h
u
s
th
e
cu
r
r
e
n
t
cir
cu
m
s
ta
n
ce
s
d
e
m
an
d
s
d
is
tr
ib
u
ted
I
DS
s
u
p
p
o
r
tin
g
h
eter
o
g
e
n
eo
u
s
en
v
ir
o
n
m
e
n
ts
a
n
d
w
h
ic
h
ca
n
s
ea
m
less
l
y
co
m
m
u
n
icate
w
it
h
its
co
m
p
o
n
e
n
ts
a
n
d
s
ca
le
a
cc
o
r
d
in
g
to
t
h
e
r
eq
u
ir
e
m
e
n
ts
o
f
th
e
n
et
w
o
r
k
[
1
3
]
.
A
d
i
s
tr
ib
u
te
s
I
DS
f
r
a
m
e
w
o
r
k
k
n
o
w
n
as
E
ME
R
AL
D
w
as
i
n
t
r
o
d
u
ce
d
b
y
P
h
il
ip
A
P
o
r
r
as
an
d
P
eter
G
Neu
m
o
m
[
1
4
]
.
I
t
p
r
o
v
id
es
a
h
ig
h
l
y
d
i
s
tr
ib
u
ted
ar
ch
itect
u
r
e
b
y
d
ep
lo
y
i
n
g
s
u
r
v
e
illa
n
ce
an
d
r
esp
o
n
s
e
m
o
n
ito
r
s
in
v
ar
io
u
s
ab
s
tr
ac
t
la
y
er
s
in
a
n
et
w
o
r
k
.
A
J
av
a
ag
e
n
t
f
o
r
m
eta
-
lear
n
i
n
g
(
J
A
M)
is
a
m
u
lti
ag
en
t
tech
n
iq
u
e
f
i
n
d
in
g
i
n
tr
u
s
io
n
s
u
s
i
n
g
d
ata
m
i
n
in
g
ap
p
r
o
ac
h
.
Ass
o
ciatio
n
r
u
les
an
d
f
r
eq
u
e
n
t
ep
is
o
d
es
m
i
n
in
g
ar
e
u
s
ed
o
n
au
d
it
d
ata
a
n
d
a
m
e
ta
-
c
lass
if
i
er
is
u
s
ed
to
lear
n
s
i
g
n
atu
r
e
s
[
1
5
]
.
L
in
J
ian
x
iao
a
n
d
L
i
L
i
j
u
an
i
n
tr
o
d
u
ce
d
an
ag
en
t
b
ased
I
DS
[
1
6
]
.
T
h
er
e
ar
e
n
o
co
n
tr
o
l
s
er
v
er
s
in
t
h
i
s
s
y
s
te
m
a
n
d
clai
m
s
r
ea
lis
t
ic
d
is
tr
ib
u
ted
d
etec
tio
n
.
E
ac
h
co
m
p
o
n
e
n
ts
o
f
t
h
e
s
y
s
t
e
m
i
s
i
n
d
ep
en
d
en
t
to
ea
c
h
o
t
h
er
an
d
al
s
o
eli
m
i
n
ates
s
i
n
g
l
e
p
o
in
t
o
f
f
ail
u
r
e.
AAFI
D
is
a
n
o
t
h
er
d
is
tr
ib
u
te
d
I
DS
ar
ch
itect
u
r
e
d
ev
elo
p
ed
b
y
E
u
g
en
e
H
Sp
a
f
f
o
r
d
an
d
Dieg
o
Z
a
m
b
o
n
i
at
C
E
R
I
US,
P
u
r
d
u
e
Un
i
v
er
s
i
t
y
[
1
7
]
.
I
t
u
s
es
ag
e
n
t
s
f
o
r
co
llecti
n
g
th
e
d
ata
w
h
ic
h
r
esid
es
in
th
e
b
o
tto
m
o
f
ag
e
n
t
’
s
h
ier
ar
ch
y
.
Up
p
er
lev
el
s
co
n
s
tit
u
tes
w
i
th
t
h
e
ag
e
n
t
s
f
o
r
co
o
r
d
i
n
atio
n
a
n
d
ag
g
r
eg
atio
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
n
a
d
a
p
tive
d
is
tr
ib
u
ted
I
n
tr
u
s
io
n
d
etec
tio
n
s
ystem
a
r
ch
itectu
r
e
u
s
in
g
mu
lti a
g
en
ts
(
R
iya
d
A
.
M
.
)
4953
T
h
e
latest
d
is
tr
ib
u
ted
in
tr
u
s
i
o
n
d
etec
tio
n
s
y
s
te
m
s
u
s
e
s
m
o
b
ile
a
g
en
t
tech
n
o
lo
g
ies
w
h
i
ch
r
ed
u
ce
s
n
et
w
o
r
k
lo
ad
,
co
llab
o
r
ativ
e
d
e
tectio
n
a
n
d
d
ec
is
io
n
m
a
k
i
n
g
,
i
n
d
ep
en
d
en
t
a
n
d
au
to
m
ated
p
r
o
ce
s
s
in
g
,
ad
ap
tab
le
to
f
u
t
u
r
e
t
h
r
ea
ts
a
n
d
p
r
o
v
id
es
ex
ce
lle
n
t
f
a
u
lt
to
ler
a
n
ce
m
ec
h
an
is
m
[
1
8
,
1
9
]
.
I
n
a
m
u
lti
ag
e
n
t I
DS d
e
v
elo
p
ed
b
y
Han
co
ck
D
L
a
n
d
L
a
m
o
n
t
G
B
,
f
lo
w
b
ased
I
DS
is
i
n
tr
o
d
u
c
ed
in
w
h
ich
r
ep
u
tatio
n
i
s
u
s
ed
to
s
elec
t
n
o
d
es
t
h
at
is
m
o
s
t
ca
p
ab
le
o
f
id
en
ti
f
y
in
g
th
r
ea
ts
.
E
l
A
j
j
o
u
r
i
M,
B
en
h
ad
o
u
S
an
d
Me
d
r
o
m
i
H
in
tr
o
d
u
ce
d
an
ar
ch
i
tectu
r
e
in
w
h
ic
h
lear
n
i
n
g
f
ea
tu
r
es a
r
e
ad
d
ed
w
h
er
e
n
o
v
el
at
tac
k
s
ar
e
f
o
u
n
d
[
2
0
]
I
t p
r
o
v
id
es h
i
g
h
a
d
ap
tab
ilit
y
to
f
u
t
u
r
e
u
n
k
n
o
w
n
t
h
r
ea
ts
.
3.
T
H
E
SY
SE
M
ARCH
I
T
E
CU
T
RE
W
e
p
r
o
p
o
s
e
a
d
ec
en
tr
alize
d
s
y
s
te
m
in
w
h
ic
h
v
ar
io
u
s
ag
e
n
ts
in
co
llab
o
r
atio
n
w
ill
co
llect
th
e
n
et
w
o
r
k
d
ata,
an
al
y
ze
an
d
id
en
tifie
s
t
h
e
in
tr
u
s
io
n
s
.
T
h
e
ap
p
r
o
p
r
iate
ac
tio
n
s
ar
e
tak
e
n
ac
co
r
d
in
g
to
th
e
r
esp
o
n
s
e
p
lan
.
T
h
e
ev
en
ts
ar
e
r
ep
o
r
ted
to
th
e
ad
m
in
i
s
tr
ato
r
s
as
w
ell.
A
cc
o
r
d
in
g
to
th
is
i
n
tr
u
s
io
n
d
etec
tio
n
s
tr
ateg
y
,
all
th
e
d
ata
to
th
e
n
et
w
o
r
k
p
ass
es
t
h
r
o
u
g
h
a
co
-
o
r
d
in
ato
r
ag
en
t
o
f
th
e
n
et
w
o
r
k
.
T
h
e
d
ep
lo
y
m
e
n
t
o
f
th
e
co
-
o
r
d
in
ato
r
ag
en
ts
s
tr
ateg
ica
ll
y
o
n
ea
ch
n
e
t
w
o
r
k
w
il
l
f
ac
ilit
ate
th
e
ex
c
h
a
n
g
e
o
f
v
al
u
ab
le
in
f
o
r
m
atio
n
a
m
o
n
g
n
et
wo
r
k
s
.
T
h
er
e
ar
e
v
ar
io
u
s
s
n
if
f
e
r
ag
en
t
s
d
is
tr
ib
u
ted
in
t
h
e
n
et
w
o
r
k
f
o
r
co
llecti
n
g
n
et
w
o
r
k
d
ata
a
n
d
s
e
n
d
th
e
m
to
t
h
e
f
ilter
i
n
g
a
g
e
n
ts
n
ea
r
b
y
.
Af
ter
th
e
p
r
ep
r
o
ce
s
s
in
g
ac
ti
v
itie
s
d
o
n
e
b
y
t
h
e
f
i
lter
in
g
a
g
en
t,
a
n
a
l
y
s
i
s
a
g
en
t
s
co
llects
th
e
p
r
ep
r
o
ce
s
s
ed
d
ata
s
to
r
ed
b
y
t
h
e
f
ilter
i
n
g
a
g
en
ts
f
o
r
an
al
y
s
i
s
an
d
d
etec
tio
n
o
f
v
ar
io
u
s
k
i
n
d
s
o
f
t
h
r
ea
ts
.
S
y
n
ch
r
o
n
i
za
tio
n
w
it
h
th
e
co
-
o
r
d
in
ato
r
ag
en
t a
n
d
w
it
h
o
th
er
an
al
y
s
is
a
g
en
ts
i
n
th
e
n
et
w
o
r
k
is
ac
h
iev
ed
f
o
r
o
b
tain
in
g
b
etter
r
esu
lts
.
A
ler
t
s
ar
e
g
en
er
ated
f
o
r
th
e
o
cc
u
r
r
en
ce
o
f
attac
k
s
an
d
n
ec
es
s
ar
y
r
esp
o
n
s
e
m
ea
s
u
r
es
ar
e
tak
en
ac
co
r
d
in
g
to
t
h
e
p
r
e
-
d
ef
in
ed
r
esp
o
n
s
e
p
la
n
s
to
v
ar
io
u
s
ca
te
g
o
r
ies
o
f
attac
k
s
.
An
ad
m
in
l
o
g
is
m
ai
n
tai
n
ed
b
y
th
e
co
-
o
r
d
in
ato
r
f
o
r
th
e
v
er
i
f
i
ca
tio
n
o
f
cr
itical
ev
e
n
ts
h
ap
p
en
ed
in
th
e
n
et
w
or
k
.
Fi
g
u
r
e
1
d
ep
icts
th
e
s
y
s
te
m
ar
ch
itect
u
r
e.
Fig
u
r
e
1
.
T
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
ar
ch
itec
tu
r
e
3
.
1
.
Co
-
o
rdina
t
o
r
a
g
ent
T
h
e
co
-
o
r
d
in
ato
r
ag
en
t
in
th
e
n
et
w
o
r
k
p
ass
e
s
in
f
o
r
m
at
io
n
a
m
o
n
g
th
e
a
g
en
ts
in
t
h
e
s
a
m
e
n
et
w
o
r
k
a
n
d
th
e
co
-
o
r
d
in
ato
r
s
o
f
o
th
er
n
et
w
o
r
k
s
.
T
h
e
co
-
or
d
in
ato
r
h
as
lo
g
f
ile
s
r
eg
ar
d
in
g
th
e
s
ec
u
r
it
y
th
r
ea
ts
en
co
u
n
ter
ed
b
y
t
h
e
n
et
w
o
r
k
t
h
at
ca
n
b
e
co
llected
b
y
o
t
h
er
co
-
o
r
d
in
ato
r
s
ag
en
t
s
o
f
o
t
h
er
n
et
w
o
r
k
s
.
T
h
e
co
-
o
r
d
in
ato
r
ag
en
t
o
f
th
e
n
et
w
o
r
k
r
ec
eiv
e
s
s
i
m
i
la
r
s
ec
u
r
it
y
i
n
f
o
r
m
atio
n
f
r
o
m
th
e
co
-
o
r
d
in
ato
r
ag
en
ts
o
f
o
th
er
n
et
w
o
r
k
s
w
h
ich
is
v
er
y
u
s
e
f
u
l
to
f
i
n
d
th
e
d
i
s
tr
ib
u
ted
t
y
p
e
o
f
attac
k
s
.
A
f
ee
d
b
ac
k
f
r
o
m
v
ar
io
u
s
a
n
al
y
s
i
s
a
n
d
d
etec
tio
n
a
g
en
ts
h
elp
s
t
h
e
co
-
o
r
d
in
ato
r
ag
en
t f
o
r
p
r
o
v
id
in
g
v
al
u
ab
le
r
ec
o
m
m
e
n
d
atio
n
s
f
o
r
r
ed
u
cin
g
f
a
ls
e
p
o
s
iti
v
es
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
9
,
No
.
6
,
Dec
em
b
er
2
0
1
9
:
4
9
5
1
-
496
0
4954
3
.
2
.
Sn
if
f
er
a
g
ent
A
t
t
h
e
in
it
ial
s
ta
g
e,
v
ar
io
u
s
s
n
i
f
f
er
ag
e
n
t
s
ar
e
cr
ea
ted
an
d
d
ep
lo
y
e
d
in
th
e
n
et
w
o
r
k
f
o
r
m
o
n
ito
r
i
n
g
th
e
n
et
w
o
r
k
.
T
h
ese
s
n
i
f
f
er
s
ar
e
p
lace
d
n
ea
r
alm
o
s
t
ev
er
y
h
o
s
t
in
t
h
e
n
et
w
o
r
k
.
T
h
e
n
et
w
o
r
k
d
ata
o
b
tain
ed
b
y
th
e
s
n
i
f
f
er
s
ar
e
s
e
n
d
to
th
e
f
ilt
er
in
g
a
g
en
t
s
w
h
ich
i
s
a
v
ailab
l
e
in
all
h
o
s
t
s
f
o
r
p
r
ep
r
o
ce
s
s
in
g
an
d
ar
r
an
g
i
n
g
th
e
d
ata
f
o
r
th
e
an
al
y
s
i
s
p
u
r
p
o
s
e
.
3
.
3
.
F
ilte
ring
a
g
ent
T
h
e
n
et
w
o
r
k
d
ata
o
b
tain
ed
f
r
o
m
th
e
s
n
i
f
f
er
ag
e
n
t
is
f
il
ter
ed
b
y
r
e
m
o
v
i
n
g
u
n
w
a
n
ted
d
ata
an
d
n
ec
es
s
ar
y
p
r
ep
r
o
ce
s
s
in
g
is
d
o
n
e
b
y
s
elec
ti
n
g
th
e
r
ele
v
an
t
f
e
atu
r
es
b
y
th
e
f
il
ter
ag
e
n
ts
.
P
C
A
al
g
o
r
i
th
m
i
s
u
s
ed
f
o
r
th
is
p
u
r
p
o
s
e
[
2
1
]
.
E
v
en
tu
all
y
,
th
e
s
e
d
ata
r
ep
o
s
ito
r
ies
a
r
e
u
s
ed
b
y
t
h
e
an
al
y
s
i
s
ag
e
n
t
f
o
r
f
u
r
t
h
er
an
al
y
s
i
s
an
d
d
etec
tio
n
o
f
attac
k
s
.
3
.
4
.
Ana
ly
s
is
a
nd
det
ec
t
io
n a
g
ent
An
al
y
s
i
s
an
d
d
etec
tio
n
ag
en
ts
ar
e
th
e
co
r
e
ag
en
ts
o
f
th
e
ar
ch
itect
u
r
e
w
h
er
e
th
e
ac
tu
al
d
etec
tio
n
o
f
th
e
t
h
r
ea
ts
ar
e
ca
r
r
ied
o
u
t.
F
o
r
th
is
p
u
r
p
o
s
e,
an
al
y
s
is
a
n
d
d
etec
tio
n
a
g
en
ts
ar
e
cr
ea
ted
an
d
d
is
p
atc
h
ed
to
v
ar
io
u
s
p
ar
ts
o
f
t
h
e
n
et
w
o
r
k
with
t
h
e
h
e
lp
o
f
t
h
e
J
A
DE
p
lat
f
o
r
m
.
An
a
n
al
y
s
is
a
n
d
d
e
tectio
n
ag
e
n
t c
a
n
tr
av
er
s
e
th
r
o
u
g
h
v
ar
io
u
s
h
o
s
t
s
co
n
tai
n
in
g
d
ata
r
ep
o
s
ito
r
ies
g
en
er
a
ted
b
y
t
h
e
f
ilter
ag
e
n
ts
.
T
h
ese
r
ep
o
s
ito
r
ies
ar
e
u
tili
ze
d
b
y
an
a
l
y
s
is
a
n
d
d
etec
tio
n
ag
e
n
ts
f
o
r
in
tr
u
s
io
n
d
etec
t
io
n
.
T
h
e
ag
en
ts
ar
e
ca
p
ab
le
o
f
co
llectin
g
t
h
e
d
ata
f
r
o
m
v
ar
io
u
s
r
ep
o
s
ito
r
ies
o
n
e
b
y
o
n
e
f
o
r
i
m
p
r
o
v
i
n
g
t
h
e
a
cc
u
r
ac
y
in
an
al
y
s
is
to
r
ea
ch
a
f
i
n
al
co
n
cl
u
s
io
n
.
Fo
r
th
e
an
al
y
s
is
p
u
r
p
o
s
e,
an
e
n
s
e
m
b
le
clas
s
i
f
icatio
n
ap
p
r
o
ac
h
is
d
ep
lo
y
ed
in
th
e
a
n
al
y
s
i
s
an
d
d
etec
tio
n
ag
e
n
t.
T
h
e
en
s
e
m
b
le
clas
s
i
f
icatio
n
a
p
p
r
o
ac
h
es
h
av
e
o
u
tp
er
f
o
r
m
ed
th
e
i
n
d
iv
id
u
al
cla
s
s
i
f
ica
tio
n
a
p
p
r
o
ac
h
es
in
ter
m
s
o
f
d
etec
tio
n
r
ate,
ac
cu
r
ac
y
an
d
f
alse
p
o
s
iti
v
e
r
ed
u
cti
o
n
r
ate.
T
h
e
class
if
ier
s
u
s
e
d
in
o
u
r
en
s
e
m
b
le
class
i
f
icatio
n
tech
n
iq
u
e
ar
e
Su
p
p
o
r
t
v
ec
to
r
m
ac
h
i
n
e
(
SVM
)
,
ar
tif
icial
n
e
u
r
al
n
e
t
w
o
r
k
(
A
N
N)
an
d
R
a
n
d
o
m
f
o
r
est
(
R
F)
clas
s
i
f
ier
s
.
T
h
is
i
s
a
v
er
y
s
tr
o
n
g
e
n
s
e
m
b
le
cla
s
s
i
f
icatio
n
ap
p
r
o
ac
h
f
o
r
d
etec
tin
g
i
n
tr
u
s
io
n
s
a
n
d
f
als
e
p
o
s
iti
v
es
ar
e
v
er
y
m
in
i
m
u
m
[
2
2
-
24
]
.
T
h
e
f
in
al
r
es
u
l
ts
o
b
tain
ed
ar
e
s
h
ar
ed
a
m
o
n
g
v
ar
io
u
s
ag
e
n
t
s
in
th
e
f
o
r
m
o
f
a
g
en
t’
s
k
n
o
w
le
d
g
e
in
ter
ac
tio
n
f
o
r
i
n
cr
ea
s
i
n
g
th
e
ac
c
u
r
ac
y
o
f
t
h
e
r
esu
lt
s
.
T
h
e
f
in
d
i
n
g
s
ar
e
f
o
r
w
ar
d
ed
to
th
e
i
m
m
ed
iate
r
esp
o
n
s
e
m
o
d
u
les
o
f
t
h
e
a
g
e
n
t
f
o
r
tak
i
n
g
n
ec
ess
ar
y
ac
tio
n
s
i
f
n
ee
d
ed
an
d
ad
m
in
i
s
tr
ato
r
lo
g
f
ile
s
.
I
m
m
ed
iate
r
esp
o
n
s
e
ag
ain
s
t
th
e
r
ea
l
ti
m
e
attac
k
s
ar
e
ac
h
iev
e
d
b
y
th
e
v
ir
tu
e
o
f
r
esp
o
n
s
e
p
lan
s
p
r
ep
ar
ed
f
o
r
ea
ch
t
y
p
e
o
f
attac
k
s
.
A
n
u
m
b
er
o
f
a
n
al
y
s
i
s
a
g
en
t
s
ar
e
cr
ea
ted
in
t
h
e
J
A
DE
p
latf
o
r
m
co
n
s
id
er
in
g
t
h
e
to
p
o
lo
g
y
o
f
th
e
n
et
w
o
r
k
.
A
s
i
n
g
le
a
n
al
y
s
i
s
an
d
d
etec
tio
n
a
g
en
t
is
e
m
p
l
o
y
ed
f
o
r
a
g
r
o
u
p
o
f
w
o
r
k
s
tati
o
n
s
i
n
t
h
e
n
et
w
o
r
k
.
T
h
e
g
r
o
u
p
s
ar
e
d
is
co
v
er
ed
o
n
th
e
b
asis
o
f
n
e
t
w
o
r
k
eq
u
ip
m
en
ts
s
u
c
h
as
r
o
u
ter
s
an
d
s
w
itc
h
es
b
y
co
n
s
id
er
in
g
th
e
co
llis
io
n
d
o
m
a
in
.
An
ag
en
t
is
ca
p
ab
le
o
f
m
o
v
i
n
g
f
r
o
m
h
o
s
t
to
h
o
s
t
in
it
s
ter
r
ito
r
y
f
o
r
an
al
y
s
i
s
an
d
d
etec
tio
n
.
I
n
o
r
d
er
to
m
a
k
e
s
u
r
e
an
an
a
l
y
s
is
a
g
e
n
t
n
e
v
er
i
n
ter
f
er
e
w
it
h
a
n
o
th
er
o
n
e
an
d
is
co
n
f
i
n
ed
to
it
s
ter
r
ito
r
y
,
an
al
g
o
r
ith
m
i
s
p
r
o
p
o
s
ed
w
h
ich
i
s
g
i
v
e
n
b
elo
w
.
A
l
g
o
r
ith
m
T
E
R
R
I
T
OR
Y
1.
Set Ro
u
te
to
NU
L
L
2.
L
ab
el
th
e
h
o
m
e
w
o
r
k
s
tatio
n
as
x
an
d
ad
d
it to
th
e
o
w
n
ter
r
ito
r
y
OT
.
L
ab
el
x
as
“
o
cc
u
p
ied
”.
3.
I
f
th
er
e
is
u
n
d
is
co
v
er
ed
ed
g
e
e
f
o
r
th
e
n
o
d
e
x
,
L
ab
el
th
e
lin
k
(e
)
as
“
OT
-
L
i
n
k
”
an
d
m
o
v
e
to
n
ex
t
n
o
d
e
y
.
4.
I
f
f
la
g
o
f
t
h
e
n
o
d
e
y
i
s
s
et
as
“o
cc
u
p
ied
”
th
en
Go
b
ac
k
to
x
an
d
lab
el
th
e
li
n
k
(
e)
as “
No
n
-
OT
-
L
i
n
k
”.
E
ls
e
Set f
la
g
o
f
t
h
e
n
o
d
e
y
as
“
o
cc
u
p
ied
”.
I
n
c
lu
d
e
lin
k
(
e)
to
R
o
u
te,
in
clu
d
e
ed
g
e
e
an
d
n
o
d
e
y
t
o
OT
5.
R
ep
ea
t 3
till
all
ed
g
es a
r
e
d
is
c
o
v
er
ed
.
6.
W
h
en
n
o
u
n
d
i
s
co
v
er
ed
ed
g
e
is
lef
t,
I
f
R
o
u
te
n
o
t N
U
L
L
th
e
n
Mo
v
e
to
th
e
last
li
n
k
in
t
h
e
R
o
u
te
an
d
d
elete
th
e
la
s
t li
n
k
e
n
tr
y
f
r
o
m
R
o
u
te
a
n
d
r
ep
ea
t 3
.
E
ls
e
R
etu
r
n
OT
A
l
g
o
r
ith
m
1
.
T
er
r
ito
r
y
alg
o
r
it
h
m
to
a
v
o
id
in
ter
f
er
e
n
ce
o
f
o
n
e
an
al
y
s
is
a
g
en
t
w
it
h
an
o
t
h
er
ag
en
t
4.
ANALY
SI
S A
ND
DE
T
E
CT
I
O
N
AG
E
NT
CO
M
M
UNICA
T
I
O
N
M
O
DE
L
T
h
e
F
ig
u
r
e
2
d
ep
icts
th
e
co
m
m
u
n
icatio
n
la
y
o
u
t
o
f
t
h
e
a
n
al
y
s
i
s
an
d
d
etec
tio
n
ag
e
n
t
w
it
h
o
t
h
er
m
o
d
u
les.
An
al
y
s
is
a
n
d
d
etec
tio
n
ag
e
n
t
s
ar
e
tr
u
e
m
o
b
il
e
ag
en
ts
w
h
ic
h
r
esid
e
i
n
t
h
e
v
ar
io
u
s
p
ar
ts
o
f
th
e
n
et
w
o
r
k
.
T
h
ese
ar
e
th
e
p
r
im
ar
y
d
etec
tio
n
m
o
d
u
les
o
f
t
h
e
n
et
w
o
r
k
.
T
h
ese
a
g
en
ts
i
n
ter
ac
t
w
ith
o
t
h
er
ag
e
n
t
s
in
th
e
s
a
m
e
n
et
w
o
r
k
f
o
r
d
eter
m
i
n
in
g
t
h
e
ac
cu
r
ac
y
o
f
t
h
e
d
etec
tio
n
as
w
ell
a
s
f
o
r
id
en
ti
f
y
in
g
t
h
e
d
is
tr
ib
u
ted
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
n
a
d
a
p
tive
d
is
tr
ib
u
ted
I
n
tr
u
s
io
n
d
etec
tio
n
s
ystem
a
r
ch
itectu
r
e
u
s
in
g
mu
lti a
g
en
ts
(
R
iya
d
A
.
M
.
)
4955
attac
k
s
.
E
ac
h
ag
e
n
t
is
ca
p
ab
le
o
f
co
m
m
u
n
icati
n
g
w
i
th
t
h
e
c
o
-
o
r
d
in
ato
r
ag
e
n
t
o
f
t
h
e
n
et
wo
r
k
f
o
r
e
x
ch
a
n
g
i
n
g
th
e
f
i
n
d
i
n
g
s
.
Fig
u
r
e
2
.
C
o
m
m
u
n
icatio
n
b
etw
ee
n
th
e
a
n
al
y
s
i
s
an
d
d
etec
tio
n
m
o
d
u
le
w
ith
o
t
h
er
m
o
d
u
le
s
4
.
1
.
Ana
ly
s
is
a
nd
det
ec
t
io
n
m
o
d
ule
T
h
is
is
th
e
m
ain
p
ar
t
o
f
th
e
d
is
tr
ib
u
ted
i
n
tr
u
s
io
n
d
etec
tio
n
a
r
ch
itect
u
r
e
w
h
er
e
th
e
d
ata
i
s
c
lass
i
f
ied
to
eith
er
n
o
r
m
al
o
r
i
n
tr
u
s
io
n
b
y
t
h
e
h
elp
o
f
en
s
e
m
b
le
clas
s
if
ica
tio
n
ap
p
r
o
ac
h
.
Her
e,
S
VM
,
A
NN
a
n
d
R
F
class
i
f
ier
s
i
n
d
iv
id
u
all
y
clas
s
i
f
y
th
e
d
ata.
B
u
t,
th
e
f
i
n
al
d
ec
i
s
io
n
is
d
o
n
e
b
y
t
h
e
en
s
e
m
b
le
ap
p
r
o
ac
h
in
w
h
ic
h
ea
ch
class
i
f
ier
s
i
s
g
i
v
en
a
w
e
ig
h
t
f
r
o
m
0
to
1
w
it
h
r
esp
ec
t
to
ac
cu
r
ac
y
.
I
f
th
e
clas
s
i
f
ier
s
ag
r
ee
ea
ch
o
th
er
,
th
e
clas
s
i
f
icatio
n
i
s
d
o
n
e
ac
c
o
r
d
in
g
l
y
a
n
d
if
t
h
e
y
d
is
a
g
r
ee
to
ea
ch
o
th
er
,
th
e
d
ec
is
io
n
o
f
th
e
cla
s
s
i
f
ier
w
it
h
th
e
h
i
g
h
e
s
t
w
e
ig
h
t
is
ta
k
e
n
i
n
to
co
n
s
id
er
atio
n
.
T
h
e
f
i
n
al
f
i
n
d
in
g
s
ar
e
u
s
ed
f
o
r
th
e
r
esp
o
n
s
e
p
u
r
p
o
s
e
an
d
al
s
o
s
h
ar
ed
b
et
w
ee
n
o
th
er
a
n
al
y
s
is
an
d
d
etec
tio
n
ag
e
n
ts
a
n
d
co
-
o
r
d
in
ato
r
ag
en
t.
4
.
2
.
Dis
t
ribute
d
da
t
a
re
po
s
it
o
ry
m
o
d
ule
T
h
ese
ar
e
r
ep
o
s
ito
r
ies
w
h
er
e
th
e
f
ilter
ed
a
n
d
p
r
-
p
r
o
ce
s
s
ed
d
ata
is
s
to
r
ed
f
o
r
t
h
e
a
n
al
y
s
is
.
T
h
e
d
ata
p
r
o
v
id
ed
b
y
th
e
s
n
i
f
f
er
ag
e
n
t
is
p
r
e
-
p
r
o
ce
s
s
ed
b
y
th
e
f
ilter
in
g
a
g
e
n
ts
a
n
d
s
et
f
o
r
th
e
an
a
l
y
s
i
s
an
d
d
etec
tio
n
ag
en
t.
An
al
y
s
i
s
an
d
d
etec
tio
n
ag
en
t
ar
r
i
v
es
i
n
th
e
h
o
s
t
i
n
w
h
ich
th
e
d
ata
r
ep
o
s
ito
r
ies
ar
e
p
r
ep
ar
ed
b
y
th
e
f
i
lter
ag
en
t
s
f
o
r
an
al
y
s
i
s
an
d
d
etec
tio
n
.
T
h
is
is
a
h
u
g
e
ad
v
an
ta
g
e
o
f
t
h
i
s
ar
ch
itect
u
r
e
s
i
n
ce
n
o
m
a
s
s
i
v
e
d
ata
is
tr
an
s
f
er
r
ed
b
et
w
ee
n
a
g
en
ts
f
o
r
an
al
y
s
i
s
.
O
n
l
y
t
h
e
f
in
d
i
n
g
s
ar
e
co
m
m
u
n
icate
d
b
et
w
ee
n
v
ar
io
u
s
a
g
en
t
s
i
n
a
s
ec
u
r
ed
m
a
n
n
er
.
4
.
3
.
Ana
ly
s
is
a
g
ent
inte
ra
ct
io
n
m
o
du
le
T
h
e
m
o
d
u
le
f
ac
i
litates
t
h
e
co
m
m
u
n
icatio
n
b
et
w
ee
n
v
ar
io
u
s
ag
e
n
ts
i
n
t
h
e
s
a
m
e
n
et
w
o
r
k
f
o
r
g
ain
in
g
co
n
f
id
e
n
ce
o
f
th
e
ir
f
in
d
i
n
g
s
as
w
ell
as
p
as
s
i
n
g
th
e
in
f
o
r
m
atio
n
ab
o
u
t
th
e
attac
k
s
o
n
v
a
r
io
u
s
h
o
s
ts
.
I
t
als
o
h
elp
s
to
f
i
n
d
d
is
tr
ib
u
ted
a
tt
ac
k
s
o
t
h
er
w
is
e
i
m
p
o
s
s
ib
le.
T
h
e
J
A
DE
p
latf
o
r
m
i
s
ef
f
e
ctiv
el
y
u
tili
ze
d
f
o
r
th
e
co
m
m
u
n
ica
tio
n
p
ass
in
g
m
ec
h
an
i
s
m
s
[
2
5
]
.
4
.
4
.
Co
-
o
rdina
t
o
r
a
g
ent
inte
ra
ct
i
o
n
m
o
d
ule
T
h
e
o
v
er
all
ev
en
t
s
o
n
v
ar
io
u
s
n
o
d
es
o
f
t
h
e
n
et
w
o
r
k
is
m
o
n
ito
r
ed
an
d
lo
g
g
ed
b
y
t
h
e
co
-
o
r
d
in
ato
r
ag
en
t
w
it
h
t
h
e
s
u
p
p
o
r
t
o
f
v
ar
io
u
s
o
th
er
a
g
en
ts
i
n
t
h
e
s
y
s
te
m
.
T
h
e
co
-
o
r
d
in
ato
r
in
te
r
ac
tio
n
m
o
d
u
le
o
f
th
e
an
al
y
s
is
a
g
en
t
s
en
d
s
t
h
e
cr
itical
s
ec
u
r
i
t
y
i
n
f
o
r
m
atio
n
o
b
tain
ed
f
r
o
m
t
h
e
an
a
l
y
s
is
to
t
h
e
co
-
o
r
d
in
ato
r
ag
en
t
if
n
ee
d
ed
.
C
o
-
o
d
i
n
ato
r
ag
en
t
co
m
m
u
n
icate
s
w
i
th
t
h
e
an
a
l
y
s
i
s
ag
e
n
t
f
o
r
p
r
o
v
id
in
g
v
a
r
io
u
s
s
u
g
g
es
s
io
n
s
r
eg
ar
d
in
g
f
al
s
e
p
o
s
iti
v
e
s
g
en
e
r
ated
b
y
d
etec
tio
n
a
g
e
n
t
an
d
it
also
p
r
o
v
id
es
in
f
o
r
m
atio
n
o
n
d
is
tr
ib
u
ted
t
y
p
es
o
f
attac
k
s
.
T
h
is
is
t
h
e
f
ea
t
u
r
e
o
f
th
is
ar
ch
i
tectu
r
e
w
h
er
e
m
o
r
e
ac
cu
r
ac
y
i
n
th
e
d
etec
tio
n
c
an
b
e
ac
h
iev
ed
b
y
r
ed
u
cin
g
th
e
f
alse p
o
s
iti
v
e
s
b
y
th
e
v
ir
t
u
e
o
f
o
th
er
a
g
en
ts
i
n
t
h
e
n
et
w
o
r
k
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
9
,
No
.
6
,
Dec
em
b
er
2
0
1
9
:
4
9
5
1
-
496
0
4956
T
h
e
f
in
d
i
n
g
s
m
ad
e
b
y
i
n
d
iv
id
u
al
a
n
al
y
s
is
a
g
e
n
ts
ar
e
co
m
p
ar
ed
an
d
u
n
i
f
ied
f
o
r
co
llectiv
e
d
ec
is
io
n
m
ak
in
g
f
o
r
ad
m
i
n
i
s
tr
ato
r
s
w
it
h
r
esp
ec
t to
v
ar
io
u
s
e
v
en
ts
.
No
r
m
a
l =
⋃
=
1
(
An
al
y
s
i
s
ag
e
n
t
j
)
(
1
)
A
ttac
k
=
⋃
=
1
(
A
n
a
l
y
s
is
a
g
en
t
j
)
(
2
)
5.
E
XP
E
R
I
M
E
NT
A
L
SE
T
UP
AND
RE
SUL
T
S
Fo
r
i
m
p
le
m
e
n
ti
n
g
an
d
ev
a
lu
atin
g
th
e
s
y
s
te
m
,
w
e
h
a
v
e
u
s
ed
KDD
c
u
p
d
ataset.
Us
u
all
y
cr
o
s
s
v
alid
atio
n
s
li
k
e
1
0
-
f
o
ld
cr
o
s
s
v
alid
atio
n
i
s
u
s
ed
f
o
r
t
h
e
ev
a
l
u
atio
n
p
u
r
p
o
s
e.
I
n
th
e
s
e
v
a
lid
atio
n
s
,
s
a
m
e
cla
s
s
o
f
tr
ain
i
n
g
d
ata
is
u
s
ed
w
it
h
o
u
t
ad
d
in
g
an
y
n
e
w
clas
s
d
u
r
in
g
test
i
n
g
.
T
h
is
m
a
y
i
n
cr
ea
s
e
t
h
e
p
er
f
o
r
m
a
n
ce
w
i
th
r
esp
ec
t to
d
etec
tio
n
ac
cu
r
ac
y
a
n
d
d
etec
tio
n
r
ate.
B
u
t,
as
w
e
c
o
n
ce
n
tr
ate
o
n
t
h
e
ca
p
ab
ilit
y
o
f
I
DS to
d
etec
t n
e
w
attac
k
s
,
w
e
u
s
e
1
0
% KD
D
c
u
p
d
ataset
f
o
r
tr
ain
i
n
g
p
u
r
p
o
s
e
a
n
d
co
r
r
ec
ted
d
ataset
f
o
r
test
in
g
p
u
r
p
o
s
e.
J
A
DE
(
J
av
a
a
g
e
n
t
d
ev
e
lo
p
m
e
n
t
f
r
a
m
e
w
o
r
k
)
is
u
s
ed
to
i
m
p
l
e
m
en
t
m
u
lti
a
g
e
n
t
s
y
s
te
m
s
.
J
P
C
A
P
(
J
av
a
lib
r
ar
y
f
o
r
ca
p
tu
r
i
n
g
an
d
s
e
n
d
in
g
n
et
w
o
r
k
p
ac
k
ets)
i
s
u
s
ed
f
o
r
co
m
m
u
n
ica
tio
n
p
u
r
p
o
s
e.
An
a
g
e
n
t
ca
n
d
is
co
v
er
an
o
th
er
a
g
en
t
i
n
r
u
n
ti
m
e
a
n
d
p
ass
m
a
s
s
a
g
es
ea
c
h
o
th
er
.
T
h
e
f
r
am
e
w
o
r
k
is
b
u
il
t
u
s
i
n
g
J
DK
1
.
4
.
1
,
J
A
DE
3
.
7
,
ec
lip
s
e
an
d
J
P
C
A
P
0
.
7
.
5
.
1
.
T
he
ex
peri
m
e
nta
l la
y
o
ut
o
f
t
he
s
y
s
t
e
m
T
h
e
lay
o
u
t
f
o
r
co
n
d
u
ctin
g
th
e
ex
p
er
i
m
en
t
is
g
iv
e
n
b
elo
w
i
n
th
e
F
ig
u
r
e
3
.
A
s
in
F
i
g
u
r
e
3
,
a
n
et
w
o
r
k
en
v
ir
o
n
m
e
n
t
i
s
s
et
u
p
in
w
h
ich
v
ar
io
u
s
w
o
r
k
s
tatio
n
s
w
er
e
d
ep
lo
y
ed
b
y
co
n
n
ec
tin
g
t
h
e
m
w
it
h
s
w
i
tch
e
s
.
A
ll
w
o
r
k
s
tatio
n
s
ar
e
co
n
f
i
g
u
r
ed
w
ith
co
r
e
i7
3
.
4
GHz
p
r
o
c
ess
o
r
w
it
h
eig
h
t
co
r
es
an
d
8
GB
R
A
M.
Op
er
atin
g
s
y
s
te
m
u
s
ed
w
a
s
W
i
n
d
o
w
s
8
.
1
w
ith
6
4
b
its
.
Ag
e
n
ts
w
er
e
d
ep
lo
y
ed
t
h
r
o
u
g
h
J
A
DE
p
lat
f
o
r
m
.
T
h
e
n
u
m
b
er
o
f
ag
en
t
s
g
e
n
er
ated
d
ep
en
d
s
ac
co
r
d
in
g
to
th
e
n
u
m
b
er
o
f
s
w
i
t
ch
es
i
n
th
e
n
e
t
w
o
r
k
.
C
o
-
o
r
d
i
n
ato
r
ag
en
t
aid
s
i
n
s
u
m
m
ar
izin
g
an
d
lo
g
g
in
g
th
e
ev
en
ts
f
o
r
f
u
t
u
r
e
v
er
if
icat
io
n
b
y
t
h
e
ad
m
in
is
tr
ato
r
s
.
A
ll
t
h
e
p
ac
k
ets
to
th
e
o
u
t
s
id
e
n
et
w
o
r
k
s
p
ass
t
h
r
o
u
g
h
t
h
e
r
o
u
ter
an
d
f
ir
e
w
al
l.
Fig
u
r
e
3
.
E
x
p
er
i
m
en
tal
la
y
o
u
t
o
f
th
e
s
y
s
te
m
5
.
2
.
Resul
t
s
I
n
o
r
d
er
to
v
er
i
f
y
t
h
e
p
er
f
o
r
m
an
ce
o
f
o
u
r
i
n
tr
u
s
io
n
d
et
ec
tio
n
m
o
d
el,
co
m
p
ar
is
o
n
s
w
it
h
o
th
er
tech
n
iq
u
es
ar
e
d
o
n
e.
W
e
u
s
e
d
r
an
d
o
m
l
y
g
e
n
er
ated
tr
ain
i
n
g
d
ataset
f
r
o
m
1
0
%
o
f
KD
D
cu
p
d
ataset.
T
esti
n
g
d
ataset
is
tak
e
n
f
r
o
m
th
e
co
r
r
ec
ted
KDD
d
ataset.
D
etailed
in
f
o
r
m
atio
n
o
n
KD
D
cu
p
d
ataset
ca
n
b
e
f
o
u
n
d
f
r
o
m
t
h
e
liter
atu
r
e
s
[
2
6
,
2
7
]
.
T
h
r
ee
k
ey
m
ea
s
u
r
es
u
s
ed
f
o
r
t
h
e
ev
al
u
atio
n
p
u
r
p
o
s
e
ar
e
ac
cu
r
ac
y
,
d
etec
tio
n
r
ate
an
d
f
alse a
lar
m
r
ate.
A
cc
u
r
ac
y
=
T
r
ue
p
o
s
i
t
i
v
es
+
T
r
ue
n
eg
at
i
v
es
T
r
ue
p
o
s
i
t
i
v
es
+
T
r
ue
n
eg
at
i
v
e
s
+
F
al
s
e
p
o
s
i
t
i
v
e
s
+
F
al
s
e
n
eg
a
t
i
v
es
(
3
)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
n
a
d
a
p
tive
d
is
tr
ib
u
ted
I
n
tr
u
s
io
n
d
etec
tio
n
s
ystem
a
r
ch
itectu
r
e
u
s
in
g
mu
lti a
g
en
ts
(
R
iya
d
A
.
M
.
)
4957
D
etec
tio
n
r
ate
=
T
r
ue
p
o
s
i
t
i
v
es
T
r
ue
p
o
s
i
t
i
v
es
+
F
al
s
e
p
o
s
i
t
i
v
es
(
4
)
Fals
e
alar
m
r
ate
=
F
al
s
e
p
o
s
i
t
i
v
es
T
r
ue
n
eg
at
i
v
es
+
F
al
s
e
p
o
s
i
t
i
v
e
s
(
5
)
T
h
e
ac
cu
r
ac
y
,
d
etec
tio
n
r
ate
a
n
d
f
al
s
e
alar
m
r
ate
o
f
o
u
r
I
DS
d
u
r
in
g
v
ar
io
u
s
t
es
tin
g
p
h
a
s
es
ar
e
s
h
o
w
n
in
t
h
e
T
ab
le
1
.
T
h
e
co
n
s
is
ten
c
y
o
f
t
h
e
s
y
s
te
m
w
i
th
r
e
s
p
ec
t
t
o
ac
cu
r
ac
y
,
d
etec
tio
n
r
ate
an
d
f
alse
alar
m
r
ate
f
o
r
d
if
f
er
e
n
t
te
s
t
d
ataset
s
i
s
g
iv
en
i
n
t
h
e
F
i
g
u
r
e
4
.
T
h
e
T
ab
le
2
co
m
p
ar
es
o
u
r
r
esu
lt
s
w
it
h
o
t
h
er
tech
n
iq
u
es [
2
8
-
3
0
]
w
it
h
r
esp
e
ct
to
n
o
r
m
al
an
d
f
o
u
r
attac
k
t
y
p
es.
T
ab
le
1
.
A
cc
u
r
ac
y
,
d
etec
tio
n
r
ate
an
d
f
alse a
lar
m
r
ate
o
f
t
h
e
p
r
o
p
o
s
ed
I
DS d
u
r
in
g
v
ar
io
u
s
t
esti
n
g
p
h
a
s
es
T
r
a
i
n
i
n
g
d
a
t
a
se
t
T
e
st
d
a
t
a
se
t
A
c
c
u
r
a
c
y
DR
F
A
R
T
r
a
i
n
i
n
g
S
e
t
1
T
e
st
S
e
t
1
9
4
.
2
1
9
4
.
1
8
0
.
0
8
T
e
st
S
e
t
2
9
2
.
4
2
9
6
.
1
9
0
.
0
9
T
e
st
S
e
t
3
9
4
.
2
2
9
6
.
8
9
0
.
0
2
T
e
st
S
e
t
4
9
2
.
6
5
9
2
.
2
1
0
.
1
1
T
r
a
i
n
i
n
g
S
e
t
2
T
e
st
S
e
t
1
9
3
.
3
5
9
8
.
6
2
0
.
0
6
T
e
st
S
e
t
2
9
4
.
6
6
9
6
.
7
3
0
.
0
1
T
e
st
S
e
t
3
9
4
.
2
3
9
5
.
2
2
0
.
1
9
T
e
st
S
e
t
4
9
5
.
2
2
9
6
.
9
9
1
.
0
8
T
r
a
i
n
i
n
g
S
e
t
3
T
e
st
S
e
t
1
9
6
.
0
1
9
0
.
9
1
0
.
0
5
T
e
st
S
e
t
2
9
3
.
9
9
9
6
.
2
3
0
.
0
1
T
e
st
S
e
t
3
9
4
.
7
6
9
5
.
9
8
0
.
1
2
T
e
st
S
e
t
4
9
4
.
5
4
9
9
.
1
2
0
.
0
3
T
r
a
i
n
i
n
g
S
e
t
4
T
e
st
S
e
t
1
9
2
.
1
2
9
5
.
6
2
0
.
0
2
T
e
st
S
e
t
2
9
5
.
2
9
9
6
.
7
1
0
.
0
1
T
e
st
S
e
t
3
9
3
.
3
3
9
6
.
0
1
0
.
0
1
T
e
st
S
e
t
4
9
4
.
7
1
9
9
.
6
2
0
.
0
3
T
ab
le
2
.
C
o
m
p
ar
is
o
n
w
i
th
o
t
h
er
tech
n
iq
u
es
w
it
h
r
esp
ec
t to
n
o
r
m
al
a
n
d
v
ar
io
u
s
attac
k
t
y
p
es
M
e
t
h
o
d
N
o
r
mal
P
r
o
b
D
o
S
U
2
R
R
2
L
O
u
r
I
D
S
9
9
.
6
9
2
.
1
9
9
.
9
9
6
.
4
9
1
.
1
W
i
n
n
e
r
K
D
D
9
9
.
5
8
3
.
3
9
7
.
1
1
3
.
2
8
.
4
R
S
S
-
D
S
S
9
6
.
5
8
6
.
8
9
9
.
7
7
6
.
3
1
2
.
4
ESC
-
I
D
S
9
8
.
2
8
4
.
1
9
9
.
5
1
4
.
1
3
1
.
5
B
a
c
o
n
-
P
e
r
i
n
9
9
.
0
8
0
.
0
8
5
.
4
9
4
.
3
5
0
.
0
S
V
M
N
-
R
B
F
9
9
.
7
9
8
.
6
8
8
.
7
6
8
.
0
2
4
.
8
Fig
u
r
e
4
.
A
cc
u
r
ac
y
,
d
etec
tio
n
r
ate
an
d
f
alse a
lar
m
r
ate
f
o
r
d
if
f
er
en
t te
s
t d
atasets
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
9
,
No
.
6
,
Dec
em
b
er
2
0
1
9
:
4
9
5
1
-
496
0
4958
T
h
e
T
ab
le
3
co
m
p
ar
es
o
u
r
r
esu
lt
s
w
it
h
o
th
er
tech
n
iq
u
e
s
w
it
h
r
esp
ec
t
to
d
etec
tio
n
r
ate
an
d
f
alse
alar
m
r
ate.
Fro
m
t
h
e
r
es
u
lt
s
,
it
ca
n
b
e
f
o
u
n
d
t
h
at
o
u
r
I
DS
i
s
h
ig
h
l
y
p
r
o
m
i
s
i
n
g
o
n
e.
I
t
ac
h
ie
v
es
g
o
o
d
r
esu
lt
s
i
n
th
e
d
etec
tio
n
o
f
v
ar
io
u
s
attac
k
s
.
T
h
e
f
alse
alar
m
s
p
r
o
d
u
ce
d
ar
e
n
eg
li
g
ib
le
an
d
ca
n
b
e
s
ee
n
f
r
o
m
th
e
F
i
g
u
r
e
5
.
T
h
e
F
ig
u
r
e
6
d
ep
icts
th
e
p
er
f
o
r
m
a
n
ce
co
m
p
ar
is
o
n
o
f
v
ar
io
u
s
tec
h
n
iq
u
es
w
i
th
r
esp
ec
t
to
n
o
r
m
al
an
d
o
th
er
v
ar
io
u
s
attac
k
t
y
p
e
s
i
n
th
e
f
o
r
m
o
f
b
ar
ch
ar
t.
T
ab
le
3
.
C
o
m
p
ar
is
o
n
w
i
th
o
t
h
er
tech
n
iq
u
es
w
it
h
r
esp
ec
t to
d
etec
tio
n
r
ate
an
d
f
al
s
e
alar
m
r
ate
M
e
t
h
o
d
DR
F
A
R
O
u
r
I
D
S
9
6
.
1
0
.
1
2
W
i
n
n
e
r
K
D
D
9
1
.
8
0
.
6
R
S
S
-
D
S
S
9
4
.
4
3
.
5
ESC
-
I
D
S
9
5
.
3
1
.
9
B
a
c
o
n
-
P
e
r
i
n
9
0
.
3
9
9
.
0
S
V
M
N
-
R
B
F
9
4
.
9
0
.
1
4
Fig
u
r
e
5
.
B
ar
ch
ar
t sh
o
w
i
n
g
th
e
d
etec
tio
n
r
ate
an
d
f
alse a
lar
m
r
ate
o
f
v
ar
io
u
s
tec
h
n
iq
u
es
Fig
u
r
e
6
.
B
ar
ch
ar
t sh
o
w
i
n
g
th
e
n
o
r
m
al
an
d
f
o
u
r
attac
k
t
y
p
es
o
f
v
ar
io
u
s
tec
h
n
iq
u
e
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
n
a
d
a
p
tive
d
is
tr
ib
u
ted
I
n
tr
u
s
io
n
d
etec
tio
n
s
ystem
a
r
ch
itectu
r
e
u
s
in
g
mu
lti a
g
en
ts
(
R
iya
d
A
.
M
.
)
4959
6.
CO
NCLU
SI
O
N
AND
F
U
T
U
RE
W
O
RK
I
n
th
is
w
o
r
k
,
a
n
a
g
e
n
t
b
as
ed
d
is
tr
ib
u
ted
in
tr
u
s
io
n
d
ete
ctio
n
s
y
s
te
m
ar
c
h
itect
u
r
e
i
s
p
r
o
p
o
s
ed
.
T
h
e
s
y
s
te
m
m
a
k
es
u
s
e
o
f
m
o
b
ile
ag
en
t
s
f
o
r
an
al
y
s
is
a
n
d
d
etec
tio
n
.
T
h
is
tr
e
m
e
n
d
o
u
s
l
y
r
ed
u
ce
s
t
h
e
n
et
w
o
r
k
laten
c
y
s
i
n
ce
th
e
p
r
o
ce
s
s
m
o
v
es
to
th
e
d
ata
f
o
r
an
al
y
s
i
s
.
He
r
e,
ag
en
ts
a
n
al
y
s
es
a
n
d
d
etec
ts
in
a
co
llab
o
r
ativ
e
f
as
h
io
n
f
ac
ilit
at
in
g
ac
cu
r
ate
d
ec
is
io
n
m
ak
i
n
g
.
W
e
u
s
ed
en
s
e
m
b
le
d
ata
m
in
i
n
g
ap
p
r
o
ac
h
f
o
r
ef
f
ec
ti
v
e
in
tr
u
s
io
n
d
etec
tio
n
.
A
s
ag
e
n
ts
ar
e
d
is
tr
i
b
u
ted
th
r
o
u
g
h
o
u
t
th
e
n
e
t
w
o
r
k
,
th
e
s
y
s
te
m
i
s
ca
p
ab
le
o
f
f
in
d
i
n
g
d
is
tr
ib
u
ted
a
n
d
co
llab
o
r
ated
attac
k
s
.
Mo
r
eo
v
er
,
th
e
co
-
o
r
d
in
ato
r
ag
e
n
t
d
o
es
th
e
s
u
m
m
ar
izi
n
g
an
d
lo
g
g
in
g
ac
ti
v
ities
o
f
a
n
et
w
o
r
k
.
I
t
also
h
as
co
m
m
u
n
i
ca
tio
n
f
ac
ilit
ie
s
w
i
th
co
-
o
r
d
in
ato
r
ag
en
t
s
o
f
o
th
er
n
et
w
o
r
k
s
to
p
er
ce
iv
e
a
h
i
g
h
e
r
p
ictu
r
e
o
f
th
e
t
h
r
ea
t
s
ce
n
ar
io
s
.
T
h
e
an
al
y
s
i
s
a
g
en
t
i
n
ter
ac
ts
w
it
h
o
t
h
er
a
n
al
y
s
is
ag
e
n
t
s
a
n
d
co
-
o
r
d
in
ato
r
ag
e
n
t
w
h
ic
h
r
ed
u
ce
s
f
alse
p
o
s
iti
v
es
s
ig
n
i
f
ica
n
tl
y
.
T
h
e
s
y
s
te
m
is
ca
p
ab
le
o
f
r
ea
ctin
g
to
t
h
r
ea
ts
i
m
m
ed
iatel
y
b
y
u
s
i
n
g
th
e
tec
h
n
iq
u
es
s
u
c
h
as
p
ac
k
et
d
is
ca
r
d
,
r
esettin
g
th
e
co
n
n
ec
tio
n
an
d
alar
m
i
n
g
to
t
h
e
au
th
o
r
ities
.
T
h
e
ag
en
t
s
lo
g
s
n
ec
ess
ar
y
i
n
f
o
r
m
atio
n
f
o
r
th
e
r
ef
er
e
n
ce
o
f
ad
m
in
is
tr
at
o
r
s
.
T
h
e
s
y
s
te
m
h
as
t
h
e
ca
p
a
b
ilit
y
o
f
ad
ap
tin
g
to
f
u
tu
r
e
n
o
v
el
attac
k
s
w
ith
t
h
e
co
llab
o
r
ativ
e
ef
f
o
r
ts
o
f
v
ar
io
u
s
m
o
d
u
les
i
n
th
e
ar
ch
itec
tu
r
e.
A
s
t
h
e
ag
en
ts
ar
e
au
to
n
o
m
o
u
s
i
n
n
at
u
r
e,
th
e
y
ar
e
ea
s
il
y
ca
p
ab
le
o
f
s
u
b
s
t
itu
tin
g
a
m
al
f
u
n
ctio
n
i
n
g
a
g
en
t
p
r
o
v
id
in
g
e
x
ce
lle
n
t
f
a
u
l
t
to
ler
an
ce
m
ec
h
a
n
is
m
.
T
h
e
ex
p
er
im
e
n
t
s
w
er
e
co
n
d
u
cted
i
n
J
A
DE
p
latf
o
r
m
f
o
r
m
o
b
ile
a
g
en
ts
a
n
d
r
esu
lts
ar
e
h
ig
h
l
y
p
r
o
m
is
i
n
g
.
I
n
th
e
f
u
t
u
r
e,
m
o
r
e
s
ec
u
r
it
y
f
ea
t
u
r
es
ar
e
to
b
e
im
p
le
m
e
n
ted
s
u
c
h
as
p
r
o
v
id
in
g
s
ec
u
r
ed
co
n
n
ec
tio
n
s
b
et
w
ee
n
a
g
e
n
t
c
o
m
m
u
n
icatio
n
s
a
n
d
s
u
g
g
e
s
t
v
ar
io
u
s
p
r
o
tectio
n
m
ec
h
an
is
m
s
f
o
r
t
h
e
a
g
en
t
i
n
a
h
o
s
tile e
n
v
ir
o
n
m
e
n
t.
E
x
p
er
i
m
en
ts
ar
e
also
to
b
e
ca
r
r
ied
o
u
t in
a
h
eter
o
g
e
n
eo
u
s
n
et
w
o
r
k
en
v
ir
o
n
m
en
t.
RE
F
E
R
E
NC
E
S
[1
]
L
iao
H.
J
.
,
e
t
a
l
.
,
“
In
tr
u
sio
n
d
e
tec
ti
o
n
sy
ste
m
:
a
c
o
m
p
re
h
e
n
siv
e
Re
v
ie
w
,”
J
o
u
rn
a
l
o
f
Ne
tw
o
rk
a
n
d
Co
m
p
u
ter
Ap
p
li
c
a
ti
o
n
s
,
2
0
1
3
.
[2
]
G.
F
o
li
n
o
a
n
d
P
.
S
a
b
a
ti
n
o
,
“
En
se
m
b
le b
a
se
d
c
o
ll
a
b
o
ra
ti
v
e
a
n
d
d
istri
b
u
te
d
in
tr
u
sio
n
d
e
tec
ti
o
n
sy
st
e
m
s: A
su
rv
e
y
,
”
J
.
Ne
two
rk
a
n
d
Co
m
p
u
ter
A
p
p
l
ica
ti
o
n
s
,
v
o
l
.
6
6
,
p
p
.
1
-
1
6
,
2
0
1
6
.
[3
]
D.
Bo
u
k
h
l
o
u
f
,
e
t
a
l
.
,
“
Ne
tw
o
rk
se
c
u
rit
y
:
d
istri
b
u
ted
i
n
tru
si
o
n
d
e
tec
ti
o
n
sy
ste
m
u
sin
g
m
o
b
il
e
a
g
e
n
t
tec
h
n
o
l
o
g
y
,
”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
C
o
mm
u
n
ica
ti
o
n
Ne
two
rk
s a
n
d
Distrib
u
ted
S
y
ste
ms
,
2
0
1
6
.
[4
]
C
.
Ja
in
a
n
d
A
.
K
.
S
a
x
e
n
a
,
“
G
e
n
e
ra
l
S
tu
d
y
o
f
M
o
b
il
e
A
g
e
n
t
Ba
se
d
In
tr
u
sio
n
De
tec
ti
o
n
S
y
ste
m
(I
DS)
,
”
J
o
u
rn
a
l
o
f
Co
mp
u
ter
a
n
d
Co
mm
u
n
ica
ti
o
n
s
,
p
p
.
93
-
9
8
,
2
0
1
6
.
[5
]
O
.
A
c
h
b
a
ro
u
,
e
t
al
.
,
“
A
Ne
w
D
istri
b
u
te
d
I
n
tru
si
o
n
De
tec
ti
o
n
S
y
ste
m
Ba
se
d
o
n
M
u
l
ti
-
A
g
e
n
t
S
y
s
tem
f
o
r
Clo
u
d
En
v
iro
n
m
e
n
t
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
C
o
mm
u
n
ica
ti
o
n
Ne
tw
o
rk
s a
n
d
In
f
o
rm
a
ti
o
n
S
e
c
u
rity,
v
o
l.
1
0
,
2
0
1
8
.
[6
]
G
a
n
a
p
a
th
y
S
.
,
e
t
a
l
.
,
“
In
telli
g
e
n
t
a
g
e
n
t
-
b
a
se
d
in
tru
si
o
n
d
e
tec
t
io
n
s
y
ste
m
u
sin
g
e
n
h
a
n
c
e
d
m
u
lt
icla
ss
S
V
M
,
”
Co
mp
u
t
a
ti
o
n
a
l
In
tel
li
g
e
n
c
e
a
n
d
Ne
u
ro
sc
ien
c
e
,
2
0
1
2
.
[7
]
Z.
Ra
n
,
“
A
M
o
d
e
l
o
f
Co
ll
a
b
o
ra
ti
v
e
In
tru
sio
n
De
tec
ti
o
n
S
y
ste
m
B
a
se
d
o
n
M
u
lt
i
-
a
g
e
n
ts
,
”
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
C
o
mp
u
ter
S
c
ien
c
e
a
n
d
S
e
rv
ice
S
y
ste
m,
2
0
1
2
.
[
8
]
Li
Y
.
,
e
t
a
l
.
,
“
A
N
e
w
D
i
s
t
r
ib
u
te
d
In
t
ru
s
io
n
D
e
t
e
c
ti
o
n
M
e
th
o
d
B
a
s
e
d
o
n
I
m
m
u
n
e
M
o
b
il
e
Ag
e
n
t
,
”
L
i
f
e
S
y
s
t
e
m
M
o
d
e
li
n
g
a
n
d
In
t
e
l
li
g
e
n
t
Co
m
p
u
t
in
g
,
I
C
S
E
E
2
0
1
0
,
L
S
M
S
2
0
1
0
.
L
e
c
tu
r
e
No
t
e
s
i
n
Co
m
p
u
t
e
r
S
c
ie
n
c
e
,
S
p
ri
n
g
e
r,
B
e
r
l
in
,
H
e
i
d
e
lb
e
r
g
,
v
o
l
.
6
3
2
8
,
2
0
1
0
.
[9
]
J.
P
.
A
n
d
e
rso
n
,
“
Co
m
p
u
ter
se
c
u
rit
y
th
re
a
t
m
o
n
it
o
ri
n
g
a
n
d
su
rv
e
il
lan
c
e
,
”
T
e
c
h
n
ica
l
re
p
o
rt,
Ja
m
e
s
P
.
A
n
d
e
rso
n
Co
m
p
a
n
y
,
F
o
rt
W
a
sh
in
g
to
n
,
P
e
n
n
s
y
lv
a
n
ia,
1
9
8
0
.
[1
0
]
H
.
De
b
a
r,
e
t
a
l
.
,
“
T
o
wa
rd
s
a
T
a
x
o
n
o
m
y
o
f
In
tru
sio
n
-
De
tec
ti
o
n
S
y
ste
m
s
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
fo
r
Co
mp
u
ter
a
n
d
T
e
lec
o
mm
u
n
ica
ti
o
n
s Ne
tw
o
rk
in
g
,
v
o
l.
3
1
,
p
p
.
8
0
5
-
8
2
2
,
1
9
9
9
.
[1
1
]
R.
G
o
p
a
lak
rish
n
a
a
n
d
E.
H.
S
p
a
ff
o
rd
,
“
A
F
ra
m
e
w
o
rk
f
o
r
Distrib
u
ted
In
tr
u
sio
n
De
tec
ti
o
n
u
sin
g
In
tere
st
Driv
e
n
Co
o
p
e
ra
ti
n
g
Ag
e
n
ts
,”
Pro
c
e
e
d
in
g
s
o
f
th
e
4
th
In
ter
n
a
ti
o
n
a
l
S
y
mp
o
siu
m
o
n
Rec
e
n
t
A
d
v
a
n
c
e
s
in
In
tru
sio
n
De
tec
ti
o
n
,
Da
v
is,
C
A
,
USA
,
2001.
[1
2
]
W
.
Ja
n
se
n
a
n
d
T
.
Ka
ry
g
ian
n
is,
“
M
o
b
i
le
A
g
e
n
t
S
e
c
u
rit
y
,”
NIST
S
p
e
c
ial
P
u
b
li
c
a
ti
o
n
8
0
0
-
1
9
.
Na
ti
o
n
a
l
In
stit
u
te
o
f
S
tan
d
a
rd
s a
n
d
T
e
c
h
n
o
lo
g
y
,
Co
m
p
u
ter S
e
c
u
rit
y
Div
isio
n
,
G
a
it
h
e
rsb
u
rg
,
M
D 2
0
8
9
9
Nik
las
,
1
9
9
9
.
[1
3
]
M
.
Ei
d
,
“
A
Ne
w
M
o
b
il
e
Ag
e
n
t
-
Ba
se
d
In
tru
sio
n
d
e
tec
ti
o
n
S
y
st
e
m
Us
in
g
d
istri
b
u
ted
S
e
n
s
o
rs
,
”
P
ro
c
e
e
d
in
g
o
f
FE
AS
C
,
2
0
0
4
.
[1
4
]
P.
A
.
P
o
rra
s
a
n
d
P
.
G
.
Ne
u
m
a
n
n
,
“
EM
ERA
LD:
Ev
e
n
t
M
o
n
it
o
rin
g
En
a
b
li
n
g
Re
sp
o
n
se
s
to
A
n
o
m
a
lo
u
s
L
iv
e
Distu
rb
a
n
ces
,
”
Na
ti
o
n
a
l
I
n
fo
rm
a
t
io
n
S
y
ste
ms
S
e
c
u
rity Co
n
fer
e
n
c
e
,
1
9
9
7
.
[1
5
]
S
.
S
to
lf
o
,
e
t
a
l
.
,
“
JA
M
:
J
a
v
a
Ag
e
n
ts
f
o
r
M
e
ta
-
Lea
rn
in
g
o
v
e
r
Distrib
u
te
d
Da
tab
a
se
s
,
”
Pro
c
e
e
d
in
g
s
o
f
t
h
e
3
rd
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
K
n
o
wled
g
e
Disc
o
v
e
ry
a
n
d
Da
t
a
M
in
i
n
g
,
Ne
w
p
o
rt
Bea
c
h
,
C
a
li
f
o
rn
i
a
,
p
p.
74
-
8
1
,
1
9
9
7
.
[1
6
]
L
.
Jia
n
x
iao
a
n
d
L
.
L
ij
u
a
n
,
“
Re
se
a
rc
h
o
f
Distrib
u
te
d
In
tru
si
o
n
De
t
e
c
ti
o
n
S
y
ste
m
M
o
d
e
l
Ba
se
d
o
n
M
o
b
i
le
A
g
e
n
t,
”
Pro
c
e
e
d
in
g
o
f
I
n
ter
n
a
ti
o
n
a
l
F
o
ru
m o
n
I
n
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
y
a
n
d
Ap
p
li
c
a
ti
o
n
,
p
p
.
53
-
5
7
,
2
0
0
9
.
[1
7
]
J.
S
Ba
las
u
b
ra
m
a
n
i
y
a
n
,
e
t
a
l
.
,
“
An
A
rc
h
it
e
c
tu
re
f
o
r
In
tru
sio
n
De
tec
ti
o
n
u
si
n
g
A
u
to
n
o
m
o
u
s A
g
e
n
ts
,
”
Pro
c
e
e
d
in
g
s o
f
th
e
1
4
th
A
n
n
u
a
l
Co
mp
u
ter
S
e
c
u
rit
y
Ap
p
li
c
a
ti
o
n
s C
o
n
fer
e
n
c
e
,
IEE
E
Co
mp
u
ter
S
o
c
iety
,
p
p
.
1
3
-
24
,
1
9
9
8
.
[1
8
]
W
.
A
.
Ja
n
se
n
,
“
In
tru
sio
n
d
e
tec
ti
o
n
w
it
h
m
o
b
il
e
a
g
e
n
t
s,”
Co
mp
u
ter
c
o
m
mu
n
ica
t
io
n
,
v
o
l
.
2
5
,
p
p
1
3
9
2
-
1
4
0
1
,
2
0
0
2
.
[1
9
]
C.
Kru
e
g
e
l
a
n
d
T
.
T
o
th
,
“
A
p
p
l
y
in
g
M
o
b
il
e
A
g
e
n
t
T
e
c
h
n
o
lo
g
y
to
I
n
tru
si
o
n
De
tec
ti
o
n
,
”
T
e
c
h
n
ica
l
re
p
o
rt
,
U
n
iv
e
rsit
y
o
f
V
ien
n
a
,
T
UV
1
8
4
1
-
2
0
0
2
-
3
1
,
2
0
0
2
.
[2
0
]
E
.
A
jj
o
u
ri
M
.
,
e
t
a
l
.
,
“
In
telli
g
e
n
t
a
rc
h
it
e
c
tu
re
b
a
se
d
o
n
M
A
S
a
n
d
CBR
f
o
r
in
tru
sio
n
d
e
tec
ti
o
n
,
”
Pro
c
e
e
d
in
g
s
o
f
t
h
e
4
th
Ed
it
io
n
o
f
Na
t
io
n
a
l
S
e
c
u
rity
Da
y
s
(JN
S
4
),
p
p
1
-
4
,
2
0
1
4
.
[2
1
]
D.
Bra
u
c
k
h
o
f
f
,
e
t
a
l
.
, “
A
p
p
ly
in
g
P
CA
f
o
r
traff
ic an
o
m
a
l
y
d
e
tec
ti
o
n
:
p
r
o
b
lem
s a
n
d
so
lu
ti
o
n
s
,”
INFO
COM
2
0
0
9
,
p
p
.
2
8
6
6
-
2
8
7
0
,
2
0
0
9
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
9
,
No
.
6
,
Dec
em
b
er
2
0
1
9
:
4
9
5
1
-
496
0
4960
[2
2
]
A.
M
.
Ri
y
a
d
a
n
d
M.
S
.
I
.
A
h
m
e
d
,
“
A
n
En
se
m
b
le
Clas
sif
i
c
a
ti
o
n
A
p
p
ro
a
c
h
f
o
r
In
tru
sio
n
De
tec
ti
o
n
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
A
p
p
l
ica
ti
o
n
s
,
v
o
l.
8
0
,
p
p
.
3
7
-
4
2
,
2
0
1
3
.
[2
3
]
S
h
riv
a
s
A
.
K
.
a
n
d
De
w
a
n
g
a
n
A
.
K
.
,
“
A
n
e
n
se
m
b
le
m
o
d
e
l
f
o
r
c
las
sif
ica
ti
o
n
o
f
a
tt
a
c
k
s
w
it
h
fe
a
tu
re
se
lec
ti
o
n
b
a
se
d
o
n
KD
D9
9
a
n
d
NSL
-
KD
D d
a
ta se
t
,
”
In
ter
n
a
t
io
n
a
l
J
o
u
r
n
a
l
o
f
C
o
m
p
u
ter
A
p
p
li
c
a
ti
o
n
s,
v
o
l
.
9
9
,
p
p
.
8
-
13
,
2
0
1
4
.
[2
4
]
G
.
F
o
li
n
o
,
e
t
a
l
.
,
“
A
n
e
n
se
m
b
le
-
b
a
se
d
e
v
o
lu
ti
o
n
a
ry
f
ra
m
e
w
o
rk
fo
r
c
o
p
in
g
w
it
h
d
istri
b
u
ted
in
tr
u
s
io
n
d
e
tec
ti
o
n
,
”
Ge
n
e
ti
c
Pro
g
ra
mm
i
n
g
a
n
d
Ev
o
lva
b
le
M
a
c
h
i
n
e
s
,
2
0
1
0
.
[2
5
]
JA
DE
Bo
a
rd
,
“
JA
DE
S
e
c
u
rit
y
A
d
d
-
On
G
UID
E
,
”
Ad
min
istra
to
r'
s
g
u
id
e
o
f
t
h
e
S
e
c
u
rity
a
d
d
-
on
,
V
e
rsio
n
2
8
-
F
e
b
ru
a
ry
-
2
0
0
5
,
JA
DE
3
.
3
,
C
o
p
y
rig
h
t
(C)
2
0
0
4
,
T
IL
A
B
,
2005
.
[2
6
]
T
a
v
a
ll
a
e
e
M
.
,
e
t
a
l
.
,
“
A
d
e
tailed
a
n
a
ly
sis
o
f
th
e
KD
D
CUP
9
9
d
a
t
a
se
t
,
”
Pro
c
e
e
d
in
g
s
o
f
t
h
e
2
n
d
IE
EE
S
y
mp
o
siu
m
o
n
C
o
mp
u
ta
t
io
n
a
l
I
n
telli
g
e
n
c
e
fo
r
S
e
c
u
rity a
n
d
De
fen
se
A
p
p
li
c
a
ti
o
n
s
,
p
p
.
1
-
6
,
2
0
0
9
.
[2
7
]
E.
Ch
a
rles
,
“
Re
su
lt
s
o
f
th
e
KD
D’9
9
Clas
sif
ier
Lea
rn
in
g
,
”
S
IGKD
D
Exp
lo
ra
ti
o
n
s
,
ACM
S
IGKD
D
Exp
lo
ra
ti
o
n
s
Ne
wsle
tt
e
r
,
v
o
l.
1
,
p
p
.
6
3
-
6
4
,
2
0
0
0
.
[2
8
]
A
.
N
.
T
o
o
si
a
n
d
M
.
Ka
h
a
n
i,
“
A
n
e
w
a
p
p
ro
a
c
h
t
o
in
tru
si
o
n
d
e
tec
ti
o
n
b
a
se
d
o
n
a
n
e
v
o
l
u
ti
o
n
a
ry
so
f
t
c
o
m
p
u
ti
n
g
m
o
d
e
l
u
sin
g
n
e
u
r
o
-
f
u
z
z
y
c
las
si
f
ie
rs
,
”
Co
mp
u
ter
c
o
mm
u
n
ica
ti
o
n
s
,
2
0
0
7
.
[2
9
]
A
.
B
.
P
e
rin
,
“
En
se
m
b
le b
a
se
d
m
e
th
o
d
s f
o
r
IDS
,
”
NT
NU
,
T
ra
n
d
h
e
i
m
,
2012.
[3
0
]
F
.
Ku
a
n
g
,
e
t
a
l
.
,
“
A
n
o
v
e
l
S
VM
b
y
c
o
m
b
in
in
g
k
e
rn
e
l
p
rin
c
i
p
a
l
c
o
m
p
o
n
e
n
t
a
n
a
ly
sis
a
n
d
im
p
ro
v
e
d
c
h
a
o
ti
c
p
a
rti
c
le
sw
a
r
m
o
p
ti
m
iza
ti
o
n
f
o
r
in
tr
u
sio
n
d
e
tec
ti
o
n
,
”
A
p
p
li
e
d
S
o
f
t
Co
m
p
u
ti
n
g
,
2
0
1
4
.
Evaluation Warning : The document was created with Spire.PDF for Python.