IDS methods normally take full advantage of a TAP or SPAN port to research a copy of the inline website traffic stream. This ensures that the IDS does not affect inline network performance. An IDS is typically positioned driving the firewall to watch inner community targeted visitors that has currently been filtered from the firewall. Anomaly