Using Intrusion Detection Systems and Firewalls