From gathered information, it uses several form of neural network to detect anomaly in network traffic pattern and report to parent Intrusion Detection System.
Even though this approach can scale well but it increases the lag time and also the faultnegative and fault-positive in threat detection.