Method for monitoring data exchanged over a network and intrusion detection device The method comprises, for at least one subset of data: a first application step (E20) to said subset of a first intrusion detection technique (G); if an anomaly is detected (E30): a second application step (E60) of a second intrusion detection technique (D) to said sub-assembly; a third application step (E80) of a third intrusion detection technique (LF) to said subset, using results from the first and second application steps; a use step (E100) of a result of the third application step for learning the second technique; a step of using (E130) a result of an application (E110) to said subset of the second technique after learning for learning of the first technique. Figure 3
展开▼