A boundlessness of methods for misuse detection as well as anomaly detection has been applied.The rule- based approach usually does not generate a large number of false alarms since it is based on rules that identify known intrusions but it fails to detect new types of intrusions as their signatures are not known.