I. Introduction
The continuous and rapid technological progress, associated with the need of networking, interconnection and integration of newly systems has implicated to need of higher security provisioning. Information security is a crucial component for defending any organization’s vital data. Any organization that wants to safeguard its networks from unwanted attacks must use security mechanisms. The intruder is identified by the network intrusion detection system which then takes the proper action against the attacker [1]. The attackers attack the system resources for getting the access and collect or destroy valuable information. Network attack can be occurred in various forms. Enterprises need to maintain the highest network security policies, self-training and network security standards to safeguard their assets against the increasingly network threats. Most common types of network attacks are as follows: Man in the middle attack, Denial of service (DoS) attack, DDoS attack, Password attacks such as Brute Force, Surfing and Dictionary, Phishing attack, Malware attack, Ransomware, Botnet attack, SQL Injection, Social Engineering attack and Eavesdropping [2].