Implementing Intrusion Detection Systems