Figure 7From: Intrusion detection model based on selective packet samplingHistogram of the number of packets per hostile user that managed to slip through the IDS undetected.Back to article page