Identify Components Of Intrusion Detection System