Nalyzing and contrasting data mining based network intrusion detection

Hello writer,
i have to complete my thesis last chapter so i have finished my
Abstract,instruction,background and related work, so if you finish the last chapter it good for me.
the last chapter as follows.

Chapter 5 Analysis and Comparison

5.1 Analysis of the NIDS Techniques

Have a indepth go of each of the 5 techniques (from chapter 4)
and try to give the advantages and disadvantages of each

5.1.1 T1

(a) brief description

(b) Advantages

*
*
*

(c) Disadvantages

*
*
*

5.1.2 T2

(a) brief description

(b) Advantages

*
*
*

(c) Disadvantages

*
*
*

5.1.3 T3

brief description
Advantages
Disadvantages

5.1.4 T4

brief description
Advantages
Disadvantages

5.1.5 T5

brief description
Advantages
Disadvantages

….

5.2 Comparison Criteria

5.2.1 Criteria 1

5.2.2 Criteria 2
.
.
.

5.2.5 Criteria 3

5.3 Comparative Analysis of the Techniques

one paragraph applying all criteria for technique1.

one paragraph applying all criteria for technique2.

one paragraph applying all criteria for technique3.

one paragraph applying all criteria for technique4.

one paragraph applying all criteria for technique5.

5.4 summary table

T1 T2 T3 T4 T5

C1

C2

C3

C4

C5

C6

Chapter 6 Discussion and Recommendations

Come up with scenarios or case studies and say which of the
techniques is more suitable to this or that other scenario.

For instance one NIDS can be better used in one domain (industry)
than another.

Chapter 7 Conclusion

please contact if you have any wueries.

thanks