Return to Article Details A Study of Data Mining Techniques towards Network Intrusion Detection