Part 3: How NG-IDS Stops Advanced Threats Legacy IDS Misses