Fig. 2From: Survey of intrusion detection systems: techniques, datasets and challengesClassification of AIDS methodsBack to article page