Flow Chart For An Intrusion Detection System