Intrusion Detection: Implementation and Operational Issues