Figure 1:
Flowchart of Intrusion Detection System.