This seminar report describes how you can protect your system from Intrusion, which is the method of Intrusion prevention and Intrusion detection. The underlying premise of our Intrusion detection system is to describe attack as instance of ontology and its first need is to detect the attack.
Fuzzy clustering is one of the techniques of I.D.This model has two phases. First phase uses data mining technique to analyze low-level data string that capture process, system and network states and to detect anomalous behavior. Second phase reasons over instances of anomalous behavior specified according to out ontology.
Integrated service checker and Automatic Backdoor Analysis is another method of network I.D.

FUll Paper Link