Return to Article Details Data Mining Approaches on Network Data: Intrusion Detection System Download Download PDF