Intrusion Detection by Analyzing Traffic