Network Intrusion And How Does It Work