Detection algorithm. Anomaly detection algorithms. anomaly detection methods. host-based intrusion detection system. application protocol-based intrusion detection system.