Beyond Traditional Alarms: How Intrusion Detection Systems Work