Using Intrusion Detection Systems in Cybersecurity