“…For anomaly detection, data mining has been applied (Lunt et al, 1992;Lee and Stolfo, 2000). Statistics (Debar et al, 1992;Anderson et al, 1995), Artificial Neural Network (ANN) (Lippmann and Cunningham, 2000;Cho and Park, 2003), Support Vector Machines (SVM) (Premanode et al, 2013), Neuro-Fuzzy (NF) computing (Mukkamala et al, 2005;Nirmala and Gowri, 2013), Multivariate Adaptive Regression Splines (MARS) (Banzhaf et al, 1998) and Linear Genetic Programming (LGP) (Mukkamala et al, 2006), Rough Set (Guo et al, 2010), Rough-DPSO (Rahman et al, 2009), BA (Alomari and Othman, 2012). These methods are commonly applied for misuse and anomaly detections.…”