Introduction to several ways of intrusion calculation