INTRUSION DETECTION AND ATTACK CLASSIFIER BASED ON THREE TECHNIQUES: A COMPARATIVE STUDY