Categories of Attacks
LimAttClassifier
Accuracy Improving Guidelines for Network Anomaly Detection
How Email Work