• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

Menu
  • About
  • Must Read
      • IIS Performance Boost
      • RFID Security
      • Web App Security Testing
      • How to Secure Home Network
      • Prevent Cross-Site Scripting Attacks
      • Renew Self-Signed Certificates
      • Penetration Testing Tools
      • VPN Concentrator
      • Forensic Investigation Tools
      • Digital Certificates
      • Cloud Security Issues
      • Advanced Evasion Prevention
      • Firewall Types
      • Tips to Prevent Data Exfiltration
      • Classified Info Handling
      • MySQL Security
      • Definition of 7 Types of Malware
      • VOIP Security
      • Why Antivirus Software Fails
      • 15 Network Security Vulnerabilities
      • Web App Security
      • IT Security Standards
      • Types of Virtualization
      • Android Security
      • Digital Signature
      • Advanced Malware Protection
    • Close
  • Consultancy
  • Contact

What is IDS?Basics of Intrusion Detection Systems

by wing

The full form of IDS is: Intrusion Detection System. How many of you have heard about burglary? I guess everyone including children. How the burglar is so successful in intruding men’s safe heaven? The answer is when there is no system exists to control the access to your house or office, and then ample of opportunities might arise to misuse or steal your valuable belongings.

IDS, basically, detects any unauthorized access to your system or network. Thief alarm is a kind of intrusion detection system, since I will be aiming at computer network security, that’s why by IDS I mean a system which can effectively detect the unauthorized access to your network or computer system via any internal or external link such as Internet.Remember that IDS only can detect an intrusion, it cannot generate any response to an intrusion.

How IDS works?

Detecting and reporting a real-time attack is the purpose of IDS. Normally, IDS based on three functional parts-a system monitoring, inference and alerting components. Always the monitoring components of IDS look out for any unusual data traffic activity in you network-just like policing in a high-way; in this case it’s an information highway. Collected data from traffic monitoring device of an IDS is sent to inference engine to decide on whether the traffic is secure or not; if secure the traffic many pass on the network in case of insecure traffic the alerting device will send a message or a signal about the launching of a probable attack on your network.

Every attack has its own nature or signature. These signature patterns are pre-configured in the interference engine of an IDS, based on which IDS determines which traffic might pose a risk for the network. Since all types of data pass through a network are captured and analyzed by the IDS, that’s why a network-based IDS needs to be very fast in action.

Types of IDS

Primarily, IDS can be divided into two different categories based on the working principles. The first one is Network-based IDS and the second one is Host-based IDS. Network-based IDS are placed in some strategic access-point of a network from the outside world. On the other hand, host-based IDS never monitor any network traffic, instead it run on a particular machine or system to be monitored. Any traffic getting in or out of that system will be monitored only; other systems’ traffic will not be either monitored or detected for any security threats.

Related Posts:

  • 5 Open-Source Host Based IDS Software to Detect Intrusion
  • How to Respond to Network Intrusion Detection
  • Host Based IDS vs Network Based IDS

Filed Under: IS Audit Tagged With: detection, ids, instrusion

Primary Sidebar

CISSP Sample Test

Take a CISSP Sample Test

CISA IT governance Sample test



Twitter Follow @securitywing

Categories

  • AWS
  • containers
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Network Security Tips
  • Off Track
  • Telecom
  • Tutorial

Pages

  • About
  • Best IT Security Certification Exam
  • CISA IT governance Sample test
  • CISA Sample Test
  • CISSP Sample Test Online
  • Consultancy
  • Contact

Popular Posts

  • How to Renew Self-Signed...
  • 7 Different Types of Fire...
  • How to install a new Goda...
  • How to Configure AAA (TAC...
  • Yahoo Mail Security Setti...
  • 3 Steps to Install Miniku...
  • 63 Web Application Securi...
  • How to Setup AWS CloudFro...
  • What is Digital Certifica...
  • 8 Effective Ways to Impro...

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

audit AWS backup basics browser check cisco cloud computer configuration data database email firewall gmail hsrp ids iis informaiton internet it kubernetes linux load balancing malware microsoft network protection redundancy risk router security security tips server SSL switch test tools vpn vrrp web webserver website windows wordpress

Copyright © 2010-2022 ·All Rights Reserved · SecurityWing.com