1. Intrusion Detection 2. Outline Intrusion detection and computer securityCurrent intrusion detection approachesData Mining Approaches for Intrusion Detection Summary 3.…