Use snort as your IDS, mysql as your database, and ACID for viewing your snort output. Get the latest snort 1.8.4 beta, as there is a known problem with snort 1.8.3 mangling certain packets when storing them to the database (might only be an issue on Linux, but I'm not sure of the details). Run it on a *BSD system if possible, as BSD has a significantly better IP stack than Linux, and is far less likely to end up dropping packets. If possible, run it in full capture mode. Make sure to get the latest snort rules from the snort web site, as the default sample rules that come with snort are pretty lightweight. Log to your database in binary mode, not ascii.
Snort does have a preprocessor with the capability to shut off connections in case of an attack, but almost all security professionals recommend against that action, as it makes it easier for an attacker to DoS your entire network, if they can figure out what you are cutting off and spoof some packets (particularly easy is the case of spoofing attacks from all the root DNS boxen, thereby cutting off your ability to do name lookups).
I use snort and ISS, and will likely soon use Cisco's IDS as well. Of the two I currently use, I find snort to be the better by far. It is easier to tune, easier to understand, and handles heavy loads much better. One of my ISS boxen locks up daily, even though it is on a 1 GHz box with 0.5 Gig memory. On the same network segment, seeing the same data, is my P-II 450 MHz box with 128 Meg of memory running snort. It has never caused me a problem. ISS is running on NT, snort on Linux.
That's just my preference.
RagManX