International Journal of Computer Applications
Cyber-attack classification and detection process is based on the fact that intrusive activities are different from normal system activities. Its detection is a very complex process in network security. In current network security scenario various types of cyber-attack family exist, some are known family and some are unknown one. The detection of known attack is not very difficult it generally uses either signature base approach or rule based approach, but to find out the unknown one is a challenging task. Intrusion detection is a process for this.