The importance of the clustering model to detect new types of intrusion in data traffic