Describir: Intrusion Detection and Correlation