preview

Intrusion Detection System Essay

Better Essays

Intrusion Detection Systems (IDS) Software
An intrusion detection system (IDS) monitors’ network traffic, monitors for suspicious activity, and alerts the system or network administrator. In some cases, the IDS may also respond to anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network. IDS come in a variety of “flavours” and approach the goal of detecting suspicious traffic in different ways.
Network based (NIDS) and host based (HIDS) intrusion detection systems. There are IDS that detect based on looking for specific signatures of known threats- similar to the way antivirus software typically detects and protects against malware- and there are IDS that detect based on …show more content…

This baseline will then identify what is the users normal behaviour gaining an idea of what bandwidth is generally used, what protocols are used, what ports and devices generally connect to each other- and alert the administrator or user of an uncommon or anomalous port use, network traffic and software downloads is detected. Significantly different than the baseline.
Passive IDS. Simply detects and alerts when suspicious or malicious traffic is detected an alert is generated and sent to the administrator or user and it is up to them to take action to block the activity or respond in some way. Identifying way not implicating any procedures after protection.
Reactive IDS, will not only detect suspicious or malicious traffic and alert the administrator but will be proactive and take a pre-assigned actions to respond to threats. Typically, this means blocking any further network traffic from the source IP address or user.
VPN, virtual private network. an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the Internet. 70% of ‘browsec’ users had selected to have their information diverted to an internet café in Amsterdam.
Overall There is a fine line between a firewall and an IDS. There is also a technology called IPS Intrusion Prevention System. An IPS is essentially a firewall which combines network-level and application-level filtering with a reactive IDS to proactively protect the network. It seems

Get Access