1. Introduction
With the rapid development and extensive application of computer networking, information and network security has become an inevitable issue faced by government, corporations and individuals. Compared with other traditional security mechanism such as firewall and data encryption, intrusion detection system (IDS) has been featured by its capacity to detect patterns of intrusion activity through active monitoring of network traffic, thus established itself as a promising technology to ensure network security.