This document discusses different types of intrusion detection systems (IDS). It describes signature-based detection which identifies known threats by comparing network traffic to attack signatures. Anomaly-based detection establishes normal traffic profiles and flags anomalies. Stateful protocol analysis compares traffic to predefined protocol operation profiles. The document also discusses host-based IDS for monitoring individual systems, network-based IDS for analyzing overall network traffic, and intrusion prevention systems (IPS) which can detect and block both known and unknown threats.