Network intrusion model for analyzing intrusion patterns | IEEE Conference Publication | IEEE Xplore