ABSTRACT
1. Introduction
2. Intrusion Detection Systems
2.1 Classification of Intrusion Detection Systems
2.2 Technical Elements of Intrusion Detection Systems
3. Models of separated Intrusion Pattern Database
3.1 Intrusion Pattern Database of General IDS
3.2 Separated Pattern Database Using Host Information
4. Example Network-based IDS using
4.1 Structure of Entire System
5. Experimental Results
5.1 Objects of Test
5.2 Attack Sequence Processing Efficiency Test
6. Conclusions and Future Works
References