“DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM”. 2019. Iraqi Journal of Information and Communication Technology 2 (2): 25-43. https://doi.org/10.31987/ijict.2.2.67.