Return to Article Details Host Based Intrusion Detection Using Data Mining Methodologies Download Download PDF