Figure 3. Classification of IDS based on used Methodology

From

A Survey on Secure Network: Intrusion Detection & Prevention Approaches

Manu Bijone

American Journal of Information Systems. 2016, 4(3), 69-88 doi:10.12691/ajis-4-3-2