It analyzes the information flowing through the community to search for patterns and indications of abnormal conduct. Should the source is spoofed and bounced by a server, it can make it very difficult for IDS to detect the origin with the attack. Firewalls restrict access concerning networks to prevent intrusion and if an attack is from insi