I. Introduction
Due to the increasing number of attacks on application layer, the effectiveness of traditional network firewalls declines. Therefore, the Intrusion Detection System (IDS) emerges as the supplement of the traditional network firewalls, which consist of a device and the corresponding software application running on it. IDS is able to monitor network or system activities to determine whether there exists malicious ctivities or policy violations, and if it does, IDS will produce reports for a management station.