AnalyzingNB, DT and NBTree Intrusion Detection Algorithms