A system and related methods are disclosed for detecting the occurrence of
an intrusion attack. A network device, such a probe, monitors traffic on
a first network and converts the traffic to a format that is suitable for
transmission on a second network. The converted traffic is forwarded to
an intrusion detection system for further processing. Prior to
transmission, the converted data may be filtered to remove data that is
not useful in detecting an intrusion attack.