Here we are present the taxonomy that consists of the specification of an intruder. Taxonomy provides the mechanism for attacks on the system that is based on host or network. The process can understand the characteristics and nature of an intruder. For creating possibilities of attack, using the system attributes like port id, system log, and path taken over the network, etc. Provides the detection mechanism which is used the pattern and using threshold values. For all these things about creating an intrusion we design a best taxonomy Это и многое другое вы найдете в книге Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network (Prashant Kumar Singh and Avimanyou Kumar Vatsa)