Intrusion Detection Techniques Research Articles