Spoofing—faking IP addresses and DNS documents to make it appear to be their traffic is coming from a trustworthy supply. An example of an NIDS could well be putting in it over the subnet wherever firewalls are located in order to check if a person is attempting to break into https://allkindsofsocial.com/story4439532/everything-about-ids