Probably the most exceptional and customary situation for an IDS for being placed is behind the firewall. The ‘at the rear of-the-firewall‘ placement makes it possible for the IDS with large visibility of incoming network visitors and will not acquire targeted traffic among users and community.Coordinated, very low-bandwidth assaults: coordinat