Intrusion Detection Systems
A major weakness of log analysis is that it is labor-intensive and prone to human error. Intrusion detection systems represent an attempt to automate part of the monitoring function. Intrusion detection systems (IDS) create logs of network traffic that was