• Intrusion detection systems. In these systems, appliances or servers monitor network
traffic and run it through a rules engine to determine whether it is malicious
according to its signature set. If the traffic is deemed malicious, an alert will fire and
notify the monitoring system.