Return to Article Details Network Intrusion Detection Using Data Mining