Data mining-based intrusion detectors