Table of contents: 1. Introduction Basic of intrusions and intrusion detection Introduction of intrusion detection systems Introduction to anomalies and signatures Anomaly detection systems Intrusion detection technology Techniques for intrusion detection 2. Literature study Intrusion detection systems Intrusion - Attackers and the attecked Dimensions of intrusion …