How Network Intrusion Detection Systems Work