Intrusion Detection in Contemporary Environments