Identifying Opportunities: Intrusion Detection