Abstract
Currently a number of people interested in obtaining unauthorized access to information contained in computer networks is growing exponentially along with all kinds of intrusions, attacks and malicious code. One of the areas that has been most studied in the context of anomaly detection is the invasion of computer networks, mainly due to the variety of attacks, as well as yours complexiti…