Implement Intrusion Detection Research Articles