I. Introduction
Currently, many services are maintained by the Internet. Common in much of the world, these websites, and applications aggregate a large amount of information and there is a need to protect this sensitive data. This process begins with the detection of possible attacks [1]. In this respect, the use of data mining techniques helps in identifying them [2].