“…Anomaly Detection Systems, however, cannot compete with Misuse Detection ones when it comes to detect wellknown attacks; therefore, each approach fails when it comes to the other's area of expertise. Now, several paradigms have been used to develop diverse NIDS approaches (a detailed analysis of related work in this area can be found for instance in (Kabiri and Ghorbani, 2005)): Expert Systems (Alipio et al, 2003), Finite Automatons (Vigna et al, 2000), Rule Induction Systems (Kantzavelou and Katsikas, 1997), Neural Networks (Mukkamala et al, 2005), Intent Specification Languages (Doyle et al, 2001), Genetic Algorithms (Kim et al, 2005), Fuzzy Logic (Chavan et al, 2004) Support Vector Machines (Mukkamala et al, 2005), Intelligent Agent Systems (Helmer et al, 2003) or Data-Mining-based approaches (Lazarevic et al, 2003). Still, none of them tries to combine anomaly and misuse detection and, fail when applied to either well-known or zero-day attacks.…”