This document summarizes intrusion detection systems (IDS). It describes the basics of IDS, including the two main types - misuse detection and anomaly detection. Misuse detection looks for patterns matching known attacks, while anomaly detection identifies abnormal network behavior. The document also discusses host-based and network-based IDS, along with their advantages and disadvantages. Finally, it covers ways that attackers can evade detection, such as by fragmenting packets or manipulating TCP headers to introduce inconsistencies between what the IDS and destination system observe.