When NIDS and HIDS are the most typical, security groups can use other IDSs for specialized purposes. A protocol-dependent IDS (PIDS) screens connection protocols among servers and units. PIDS tend to be put on World wide web servers to watch HTTP or HTTPS connections. When the supply is spoofed and bounced by a server, it can make it very diffi