Priorities in the deployment of network intrusion detection systems