To detect misuse and anomaly attacks through rule induction analysis and fuzzy methods