“…First, none of the related works was based on only malicious data collected by advertised, fully functional, threetier honeypot system, with standard security settings. Most of the papers [1], [2], [3], [4], [5], [14], [15], [16], [17] used the outdated DARPA and KDD 1999 datasets, which in addition to the normal traffic include four classes of simulated attacks.…”