DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM. (2019). Iraqi Journal of Information and Communication Technology, 2(2), 25-43. https://doi.org/10.31987/ijict.2.2.67