https://1library.net/document/q73x9xry-internal-intrusion-detection-protection-using-mining-forensic-techniques.html