In this section we explain the intrusion detection
techniques. Basically, there are two techniques in IDS:
Anomaly based and Signature/Misuse based intrusion
detection. Amiable, one of the main factors that should be
considered while buying IDS which is whether to go for an
Anomaly based or signature based detection technique. IDS
vendors should be aware of the pros and cons of these
techniques. We also explain the Target Monitoring and
Stealth Probe techniques later in this section.