The principle, sort and structure of IDS are introduced, and several methods based on the weak points ofIDS used by hacker to attackIDS are listed, and the method of resolving these problems is given.
Intrusion DetectionSystem IDS) isa new effective ( tools to defend hacker's attack, but it stiil has some weak points. This paper introduces principle, sort and structure of IDS, lists several methods based on the weak points of IDS used by hacker to attack IDS, gives the method of resolving these problems.