Evaluating the Effectiveness of Different Intrusion Detection Systems