Statistical Approaches to Intrusion Detection: an Overview of Selected Methods