This document discusses intrusion detection systems (IDS), which monitor networks and systems for malicious activity such as malware, attacks, and unauthorized access. An IDS typically consists of sensors to detect security events, an engine to analyze the events and generate alerts, and a console for administrators to monitor alerts and configure sensors. Network and host-based IDS monitor network traffic and host activities respectively. IDS can detect a wider range of attacks than firewalls by analyzing network traffic and system behaviors.