What is an Intrusion Detection System?
Intrusion Detection System monitors network activity and prevents you computer from being hacked into.
There are different types of intrusion detection systems and each one of them has their own unique feature Intrusion Detection System is also referred to as IDS.
It is a tool that inspects every internal or external network activity and determines if any suspicious behavior is being carried out.
It also tracks attacks to the system and finds out if someone is trying to hack into the system.
An IDS can be categorized into several categories.
Misuse detection system in one of the basic types of intrusion detection techniques.
It analyzes the information that has been collected and compares this information with another collection of attack prototype.
In simple terms these systems only consider for threats that are already present in the database of attack signature.
Another type of intrusion detection technique is ''anomaly detection" in which the administrator sets the baseline, data transfer of the network, protocol, crashes etc.
Network based IDS is one more method of intrusion detection which is also known as NIDs.
This type of detection system analyzes the packets that flow through a network individually.
NIDS is also competent of determining suspicious packets which are capable of being overlooked by basic defined rules of any firewall.
There are other techniques such as 'host based system' which inspects the IDs and activities occurred on a particular host or computer.
'Passive' intrusion detection system is again an efficient way of determining suspicious movement.
It identifies any violation occurred against the security rules, registers details of the activity as logs and then notifies the user about the malicious program or action.
All of the above mentioned systems are effective in their own ways.
You need to determine which intrusion termination system is best suited for you.
Unlike firewall, which prevents intrusions to your computer, Intrusion detection systems detects intrusion which already occurred in your computer in order to terminate this malicious elements.
One of the best features on IDS is that it also keeps a track of internal activities and monitors attacks generated within the system.
There are different types of intrusion detection systems and each one of them has their own unique feature Intrusion Detection System is also referred to as IDS.
It is a tool that inspects every internal or external network activity and determines if any suspicious behavior is being carried out.
It also tracks attacks to the system and finds out if someone is trying to hack into the system.
An IDS can be categorized into several categories.
Misuse detection system in one of the basic types of intrusion detection techniques.
It analyzes the information that has been collected and compares this information with another collection of attack prototype.
In simple terms these systems only consider for threats that are already present in the database of attack signature.
Another type of intrusion detection technique is ''anomaly detection" in which the administrator sets the baseline, data transfer of the network, protocol, crashes etc.
Network based IDS is one more method of intrusion detection which is also known as NIDs.
This type of detection system analyzes the packets that flow through a network individually.
NIDS is also competent of determining suspicious packets which are capable of being overlooked by basic defined rules of any firewall.
There are other techniques such as 'host based system' which inspects the IDs and activities occurred on a particular host or computer.
'Passive' intrusion detection system is again an efficient way of determining suspicious movement.
It identifies any violation occurred against the security rules, registers details of the activity as logs and then notifies the user about the malicious program or action.
All of the above mentioned systems are effective in their own ways.
You need to determine which intrusion termination system is best suited for you.
Unlike firewall, which prevents intrusions to your computer, Intrusion detection systems detects intrusion which already occurred in your computer in order to terminate this malicious elements.
One of the best features on IDS is that it also keeps a track of internal activities and monitors attacks generated within the system.
Source...