Fig. 2From: A novel time efficient learning-based approach for smart intrusion detection systemPorts used during various attacksBack to article page