my experiment

October 5, 2015
Develop a model that uses various network features to detect which network activities are part of an intrusion/attack.