Abstract
Traditional pattern recognition techniques assume that data is independent and identically distributed. Although in many real cases this is not true, in the context of intrusion detection, for instance, each sample of the dataset represents an access to a particular computer. The feature vector is created using TCP/IP packet information, such as source and destination address, packet size…