This document discusses using intrusion detection systems (IDS) to monitor web applications for security threats. It explains that IDS can be used to detect both known and unknown attacks. A positive security model uses whitelists to allow only known good traffic, but this has limitations for complex data types. A negative security model uses blacklists of known attack patterns, but cannot detect all unknown attacks. The document advocates a tiered approach to security logging and monitoring with increasing levels of detail and prioritization of alerts.