Network Intrusion Detection: Monitoring, Simulation And Visualization