Intrusion Detection Systems analyzes network traffic for signatures that match known attacks. IPS, in addition to doing the analysis part, also stops packets from being delivered upon detection of a potential attack. IPS systems live in the same area of a network as a firewall and proactively denies network traffic if a packet is detected as a security threat, based on a security profile. The effectiveness of both IDS and IPS depends on the cyberattack databases. Unless the databases are updated regularly, the systems wont be effective. IDS/IPS systems audit data and auditing data is always integral to ensuring compliance.”]
Source: https://hackercombat.com/ids-ips-and-their-role-in-cybersecurity/