Intrusion
Figure 1: Flowchart of Intrusion Detection System.