Techniques For Detecting Intrusions