Apply data mining to defense-in-depth network security system | IEEE Conference Publication | IEEE Xplore