Intrusion Detection: From Theory to Practice