Through the intrusion detection and data flow outlier mining technology research, the data flow anomalies mining application to Intrusion Detection and Intrusion Detection become an effective new methods and research. Based on data flow outlier Mining Intrusion Detection System Model for the design, and data flow outlier mining algorithm has been designed and realized, through...