The IDS can not do much with encrypted traffic except understand a few protocol violations. For the IDS to understand see the traffic you might want to use a SSL accelerator and have the IDS behind that. Another option you may want to consider is HIDS. Since the IDS CAN NOT understand the encrypted traffic it is blind to SQL injection / insertion techniques. These are not always done over SSL so some signatures may catch minor stuff. The majority, however, should be over SSL. Once again HIDS probably does a better job with this.
Getting Started
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: