This document provides an overview of intrusion detection systems (IDS). It defines intrusion, intrusion detection, and intrusion prevention. It discusses the types of IDS, including misuse detection, anomaly detection, host-based IDS, and network-based IDS. It covers the components, approaches, and key metrics of IDS, including detection rates, false positives/negatives, and throughput. Technical bypass techniques for IDS are also outlined, along with zero-day attacks and some problems with current IDS.