Return to Article Details A comparison of several intrusion detection methods using the NSL-KDD dataset Download Download PDF