Analysis of Approaches of Monitoring, Intrusion Detection and Identification of Network Attacks | IEEE Conference Publication | IEEE Xplore