Return to Article Details Flow-Based Approach on Bro Intrusion Detection Download Download PDF