This document discusses using intrusion detection systems (IDS) to monitor web applications for security threats. It explains that IDS can be used to detect both known and unknown attacks by logging all activity and applying both whitelist and blacklist rules. The document also provides examples of how common vulnerabilities like SQL injection, XSS, and session hijacking could be detected. It recommends a tiered approach to IDS with different levels of logging, alerting, and blocking of suspicious traffic.