Although some host-centered intrusion detection systems anticipate the log data files to be collected and managed by a different log server, Some others have their particular log file consolidators created-in as well as Acquire other details, which include community visitors packet captures.Protocol-Primarily based Intrusion Detection System (PIDS)