Return to Article Details Towards Configured Intrusion Detection Systems