Generalization of a Constraint Based Intrusion Detection System