I. Introduction
Intrusion detection system (IDS) is an indispensable tool in an organization’s armour to protect it from cyber attacks. An IDS can be classified as signature based or anomaly based. In signature based systems, already known signatures of attacks are stored in a database. If any of these attack signatures is found in an incoming packet, it is treated as malicious. The advantage of this type of IDS is that a malicious packet can be accurately detected if its signature is already known. The disadvantage of this type of IDS is its inability to detect zero day attacks. Examples of popular signature based IDS are BRO [1] and SNORT [2] . On the contrary, the anomaly detection method models the normal network behavior, and identifies anomalies as deviations from normal network behavior. They are appealing because of their ability to detect previously unseen attacks. A good survey of intrusion detection systems can be found in [3] .