Network intrusion detection methods are accustomed to detect suspicious exercise to capture hackers before harm is done into the community. You will discover network-dependent and host-dependent intrusion detection techniques. Host-dependent IDSes are set up on customer computer systems; community-dependent IDSes are around the community by itself.