Answer:
- Network intrusion detection system (NIDS)
- Works in real time
- They look for incoming traffic, outgoing traffic and local traffic
- They take protective measures by their own
-They need to be constantly updated
-They are complicated to get optimal settings
-If they don't have a suitable configuration, you can have many false positives.
- Host-based intrusion detection system (HIDS)
- Can monitore all or parts of the dynamic behavior and the state of a computer system
- Can detect which program accesses what resource
-The hacker needs to leave a trace
-It's like an antivirus
-They are a complement of a NIDS.
I would choose the NID System because it offers me a widder protection by it self.