Design of an intrusion detection method

Summary
Design of an intrusion detection method