Fig. 3From: A novel time efficient learning-based approach for smart intrusion detection systemPorts used in Infiltration attacksBack to article page