“…Some of these techniques that are widely used for an intrusion detection are statistic (Lazarevic et al, 2003), hidden Markov model (Ye and Borror, 2004), artificial neural network (Debar et al, 1992;Novikov et al, 2006;Ramadas and Tjaden, 2003;Fisch et al, 2010), fuzzy logic (Saniee Abadeh et al, 2007;Chimphlee et al, 2006;Toosi and Kahani, 2007), rule learning (Cohen, 1995;Xuren et al, 2006) and outlier detection schema (Lazarevic et al, 2003).…”