This document discusses using intrusion detection systems (IDS) to monitor web applications for security threats. It explains that IDS can be used to detect both known and unknown attacks. A positive security model uses whitelists to allow only known good traffic while a negative model uses blacklists to detect malicious patterns. The document then examines how different types of attacks from the OWASP Top 10 could be detected, such as cross-site scripting, SQL injection, and session hijacking. It recommends a three-tiered approach to security monitoring that involves logging all activity, detailed logs of attacks, and alerts of potential intrusions.