... RELATED WORKToday, there are generally two types of intrusion detection systems (IDS): misuse detection and anomaly detection. Mis-use detection techniques attempt to model attacks on a sys-tem ... use of information retrievaltechniques for intrusion detection, ” in Proceedings of the 1stInternational Wor kshop on the Recent Advances in Intrusion Detection (RAID ’98), Louvain-la-Neuve, Belgium, ... “An intrusion detection model,” IEEE Transac-tions on Software Eng ineering, vol. 13, no. 2, pp. 222–232, 1987.[31] A. Ghosh, J. Wanken, and F. Charron, Detection anoma-lous and unknown intrusions...