Analysis And Evaluation Of Network Intrusion Detection Methods To Uncover Data Theft