A method of forming a virtual intrusion detection system includes the step
of positioning a set of sensors in a network environment, each sensor
supporting multiple logical traffic paths. The method also includes the
step of providing a set of sensor management systems corresponding to the
set of sensors. This set of sensor management systems enforces a set of
virtual intrusion detection systems, wherein each virtual intrusion
detection system corresponds to a predetermined logical traffic path
through the set of sensors, each virtual detection system providing
sensor traffic information solely to authorized parties.