Fig. 6From: Survey of intrusion detection systems: techniques, datasets and challengesUsing Clustering for Intrusion DetectionBack to article page