Evaluation of Intrusion Detection Systems