An intrusion detection mechanism is provided for flexible, automatic,
thorough, and consistent security checking and vulnerability resolution
in a heterogeneous environment. The mechanism may provide a predefined
number of default intrusion analysis approaches, such as signature-based,
anomaly-based, scan-based, and danger theory. The intrusion detection
mechanism also allows a limitless number of intrusion analysis approaches
to be added on the fly. Using an intrusion detection skin, the mechanism
allows various weights to be assigned to specific intrusion analysis
approaches. The mechanism may adjust these weights dynamically. The score
ration can be tailored to determine if an intrusion occurred and adjusted
dynamically. Also, multiple security policies for any type of computing
element may be enforced.