• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

Menu
  • About
  • Must Read
      • IIS Performance Boost
      • RFID Security
      • Web App Security Testing
      • How to Secure Home Network
      • Prevent Cross-Site Scripting Attacks
      • Renew Self-Signed Certificates
      • Penetration Testing Tools
      • VPN Concentrator
      • Forensic Investigation Tools
      • Digital Certificates
      • Cloud Security Issues
      • Advanced Evasion Prevention
      • Firewall Types
      • Tips to Prevent Data Exfiltration
      • Classified Info Handling
      • MySQL Security
      • Definition of 7 Types of Malware
      • VOIP Security
      • Why Antivirus Software Fails
      • 15 Network Security Vulnerabilities
      • Web App Security
      • IT Security Standards
      • Types of Virtualization
      • Android Security
      • Digital Signature
      • Advanced Malware Protection
    • Close
  • Consultancy
  • Contact

What is IDS?Basics of Intrusion Detection Systems

by wing

The full form of IDS is: Intrusion Detection System. How many of you have heard about burglary? I guess everyone including children. How the burglar is so successful in intruding men’s safe heaven? The answer is when there is no system exists to control the access to your house or office, and then ample of opportunities might arise to misuse or steal your valuable belongings.

IDS, basically, detects any unauthorized access to your system or network. Thief alarm is a kind of intrusion detection system, since I will be aiming at computer network security, that’s why by IDS I mean a system which can effectively detect the unauthorized access to your network or computer system via any internal or external link such as Internet.Remember that IDS only can detect an intrusion, it cannot generate any response to an intrusion.

How IDS works?

Detecting and reporting a real-time attack is the purpose of IDS. Normally, IDS based on three functional parts-a system monitoring, inference and alerting components. Always the monitoring components of IDS look out for any unusual data traffic activity in you network-just like policing in a high-way; in this case it’s an information highway. Collected data from traffic monitoring device of an IDS is sent to inference engine to decide on whether the traffic is secure or not; if secure the traffic many pass on the network in case of insecure traffic the alerting device will send a message or a signal about the launching of a probable attack on your network.

Every attack has its own nature or signature. These signature patterns are pre-configured in the interference engine of an IDS, based on which IDS determines which traffic might pose a risk for the network. Since all types of data pass through a network are captured and analyzed by the IDS, that’s why a network-based IDS needs to be very fast in action.

Types of IDS

Primarily, IDS can be divided into two different categories based on the working principles. The first one is Network-based IDS and the second one is Host-based IDS. Network-based IDS are placed in some strategic access-point of a network from the outside world. On the other hand, host-based IDS never monitor any network traffic, instead it run on a particular machine or system to be monitored. Any traffic getting in or out of that system will be monitored only; other systems’ traffic will not be either monitored or detected for any security threats.

Related Posts:

  • How to Respond to  Network Intrusion Detection
    How to Respond to Network Intrusion Detection
  • 5 Open-Source Host Based IDS Software to Detect Intrusion
    5 Open-Source Host Based IDS Software to Detect Intrusion
  • advanced evasion technique
    How to Protect Networks against Advanced Evasion…
  • Top 15 Network Security Vulnerabilities that System Administrators Must Know
    Top 15 Network Security Vulnerabilities that System…
  • network based ids
    Host Based IDS vs Network Based IDS
  • laptop security
    Laptop Security Devices and Tips

Filed Under: IS Audit Tagged With: detection, ids, instrusion

Primary Sidebar

Categories

  • AWS
  • containers
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Network Security Tips
  • Off Track
  • Telecom
  • Tutorial

Related Posts

  • How to Respond to  Network Intrusion Detection
    How to Respond to Network Intrusion Detection
    When your intrusion detection system triggers an intrusion alarm, you…
  • 5 Open-Source Host Based IDS Software to Detect Intrusion
    5 Open-Source Host Based IDS Software to Detect Intrusion
    This post is to help you learn about five effective…
  • advanced evasion technique
    How to Protect Networks against Advanced Evasion…
    Evasion techniques evade the exiting network security devices such as…
  • Top 15 Network Security Vulnerabilities that System Administrators Must Know
    Top 15 Network Security Vulnerabilities that System…
    This post aims to help you familiarize with the top…
  • network based ids
    Host Based IDS vs Network Based IDS
    Based on the location in a network, IDS can be…
  • laptop security
    Laptop Security Devices and Tips
    Providing physical security to your laptop is your primary concern…
  • windows server security best practices
    Top 20 Windows Server Security Hardening Best Practices
    By following windows server security best practices, you can ensure…
  • basics of oracle database security
    Oracle Security Basics
    Popularity has a price to pay since everything on this…
  • Webhosting Security-Best Practices and Concerns
    Webhosting Security-Best Practices and Concerns
    To many IT professionals, webhosting security means protecting websites from…
  • network security breach investigation
    Tips for Network Security Breach Investigation
    Investigating  network security breach may seem to be a daunting…
  • CISSP Exam Domains
    CISSP Exam Domains
    Computer security is getting more importance day by day due…
  • 7 types of malware
    Definition of 7 Types of Malware
    Though malware may take many forms, they have only one…

CISSP Sample Test

Take a CISSP Sample Test

CISA IT governance Sample test



Twitter Follow @securitywing

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

antivirus audit AWS backup browser check cisco cloud computer cyber data database encryption firewall home hsrp ids informaiton internet intrusion it kubernetes linux load balancing malware network protection putty risk router security security tips server ssh SSL switch tools virus vpn vulnerability web webserver website windows wordpress

Copyright © 2010-2023 ·All Rights Reserved · SecurityWing.com