A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
To avoid increasing threats of intrusion or vulnerabilities, networks require flexible and efficient security systems. Intrusion detection system (IDS) is the basic component of any network defense scheme. Different IDS use several techniques for Intrusion detection. Signature base detection techniques are widely used in networks for fast response to detect threats. Regarding the intrusion detection technique, one of the main challenges is to control the huge traffic volume where each packetdoi:10.7763/jacn.2014.v2.124 fatcat:a64go23wynerpcr5scgj7k2beu