Beyond Traditional Alarms: How Intrusion Detection System Work