Discuss the differences between an anomaly-based and a misuse-based

  

Discuss these technologies 1)host based intrusion detection system 2)network based intrusion detection system 3)intrusion prevention system 4)honeypots and honeynets and describe how you deploy them to protect a small business network. Describe the protection each technology provides?