1. Introduction
Both computer system and application software have vulnerabilities and bugs [1], which lead to intrusions frequently. Intrusion detection technique is used to protect a host and network, for fear that they are attacked by hackers. According to data source that used, there are three kinds of intrusion detection techniques [3]: host-based intrusion detection, network-based intrusion detection and hybrid intrusion detection.