Analysis and Response for Intrusion Detection in Large Networks