Chapter 6. Intrusion Detection with IPCop