Most, if not all, activities of present intrusion detection systems are involved with the detection and reporting of attacks; worse, these are deflected attacks. IDS devices are typically placed outside of perimeter defenses, and treat only incoming traffic.