Detecting Network Intruders by Examining Packet Crossovers in Connections