Computing Internet / Network Security Intrusion
detection system
Introduction to Intrusion Detection Systems (IDS)
What is an IDS?
Intrusion detection systems types of ids
An intrusion
detection system (IDS) monitors network traffic and monitors for suspicious
activity and alerts the system or network administrator.
In some cases the IDS
may also respond to anomalous or malicious traffic by taking action such as
blocking the user or source IP address from accessing the network.
IDS come in a variety of “flavors” and approach
the goal of detecting suspicious traffic in different ways.
There are network
based (NIDS) and host based (HIDS) intrusion detection systems. There are IDS
that detect based on looking for specific signatures of known threats- similar
to the way antivirus software typically detects and protects against malware-
and there are IDS that detect based on comparing traffic patterns against a
baseline and looking for anomalies. There are IDS that simply monitor andalert
and there are IDS that perform an action or actions in response to a detected
threat. We’ll cover each of these briefly.
NIDS
Network Intrusion
Detection Systems are placed at a strategic point or points within the network
to monitor traffic to and from all devices on the network. Ideally you would
scan all inbound and outbound traffic; however doing so might create a
bottleneck that would impair the overall speed of the network.
HIDS
Host Intrusion Detection Systems are run on
individual hosts or devices on the network. A HIDS monitors the inbound and outbound
packets from the device only and will alert the user or administrator of suspicious
activity is detected
Signature Based
A signature based IDS
will monitor packets on the network and compare them against a database of
signatures or attributes from known malicious threats. This is similar to the
way most antivirus software detects malware. The issue is that there will be a
lag between a new threat being discovered in the wild and the signature for
detecting that threat being applied to your IDS. During that lag time your IDS
would be unable to detect the new threat.
No comments:
Post a Comment