This document discusses network security and intrusion detection systems. It provides an overview of host-based and network-based intrusion detection, as well as misuse detection techniques like SNORT and anomaly detection using artificial neural networks or artificial immune systems. It also discusses issues like authentication, confidentiality, integrity and availability in network security and goals of intrusion detection systems.