Intrusion Detection, Attacks, and Countermeasures