Critically review both academic and practitioner journals related to top intrusions that have happened in the recent past. Design an effective intrusion detection and prevention system that could have potentially resolved the weakness along with an implementation plan.