Watch this video on YouTube
Which conceptual approach to intrusion detection system is the most common?