The document provides an introduction to intrusion detection systems (IDS). It defines key concepts related to information security like threats, attacks, and security goals of confidentiality, integrity and availability. It discusses different types of attacks such as passive eavesdropping and active attacks like interruption, modification and fabrication. The document then introduces IDS, explaining what it is, the need for it, types of intrusions from inside and outside, and classifications of IDS based on information source, type of information and usage frequency.