Building a budget-friendly intrusion detection system, Part 2