Return to Article Details Applying Intrusion Detection Algorithms on the KDD-99 Dataset Download Download PDF