This document discusses using intrusion detection systems (IDS) to monitor web applications for security threats. It explains that IDS can be used to detect both known and unknown attacks by logging all activity and applying both whitelist and blacklist rules. The document also provides examples of how different types of attacks could be detected, such as SQL injection, cross-site scripting, and session hijacking. It recommends a three-tiered approach to IDS that involves logging all activity, detailed logging of detected attacks, and flagging possible intrusions for manual review.