“…Content based and Context based monitoring (Kiley, Dankner, & Rogers, 2008) is another effective approach for network monitoring and detection of attacks which incorporates data mining and database auditing techniques (Ingols, Chu, Lippmann, Webster, & Boyer, 2009). The data mining techniques utilized in IDS helps in pattern comparison (Heydari, Martin, Rjaibi, & Lin, 2010) and sequence analysis and identify attacks in an effective manner .…”