vulnerability scanning intrusion detection