Cyber Security: The Ultimate Guide to Attack Detection Systems