Analysis of four common Linux server intrusion levels