This document describes another method for intrusion detection. It is based on a proactive ruleset as opposed to reactive ruleset.