Nowadays with vast growing number of network information systems and their integration not only into work but also into people’s private life, security assurance of industrial and private information assets is becoming an extremely sensitive and topical issue. There is a huge number of available noncommercial (free of charge) and commercial methods for information protection from unauthorized access of undesirable individuals. Currently, studies in the field of information security focus on the use of various intellectual data mining techniques for building an intellectual information security system. Such security systems roughly (for the purpose of this paper) can be divided into intrusion protection and intrusion detection systems – IPS and IDS, respectively [1].