Two Techniques For Intrusion Detection