• Anomaly detection: Rules are developed to detect deviation from previous usage patterns. • Penetration identification: An expert system approach that searches for suspicious behavior.
• Anomaly detection: Rules are developed to detect deviation from previous usage patterns.• Penetration identification: An expert system approach that searches for suspicious behavior.