This document summarizes a presentation on intrusion detection systems. It discusses the growing risks of e-business and need for intrusion detection strategies. It covers misuse and anomaly detection approaches, and tools that operate at the application, host, and network levels. It also addresses active and passive response techniques, system architectures, technical challenges, legal issues, and commercial and open source intrusion detection systems.