As an example, an assault on an encrypted protocol cannot be read through by an IDS. If the IDS simply cannot match encrypted traffic to present databases signatures, the encrypted visitors is not encrypted. This makes it very difficult for detectors to detect assaults.An intrusion detection procedure monitors (IDS) network website traffic for susp