This document discusses using intrusion detection systems (IDS) to monitor web applications for security threats. It explains that IDS can be used to detect both known and unknown attacks. A positive security model uses whitelists to allow only known good traffic while a negative model uses blacklists to detect malicious patterns. The document then examines how different types of attacks from the OWASP Top 10 could be detected, such as XSS, SQL injection, and session hijacking. It advocates a three-tiered approach to security monitoring with different levels of logging and alerting.