We simultaneously generate attacks from many computers as shown in Figure 4 consisting of 4 DoS attack types and 14 Probes attack types to a computer victim that hosts our RT-IDS. Many Internet services on Ethernet are used full load in order to generate normal network activity.