Intrusion Detection System in Cyber Security

What is Intrusion Detection System

An Intrusion detection system for all inbound and outbound hardware activities it can be set up to identify any suspicious network activity patterns that may indicate a network attack or system attack. Unusual patterns that are known to generally attack networks can signify someone attempting to break network security or system or trying to compromise the system.

An IDS can be a hardware or software-based security service that monitors and analyzes system events for the purpose of finding and providing real-time warning of events that are identified by the network configuration to attempt to access system researchers in an authorized manner.

Types of Intrusion Detection System

There are many ways in which an IDS can be categorized as follows depending on its use:

On the Basis of Detection:

Misuse Detection:

In IDS analyses the information it gathers and compares it to the database of attack signature. This type of IDS depends on attacks that have already been documented like a virus detection system, software for misuse detection is only as good as the databases of attack signature.

Anomaly Detection:

In this type of detection system, a baseline is established. It consists of things such as the network’s traffic load state, breakdown, protocol, and typical packet size.

On the Basis of Location & Place:

Network Based IDS (NIDS):

NIDS monitors network traffic and uncovers possible attacks or suspicious activities. In a NIDS, the IDS sensors evaluate the individual packets that are flowing through the network.

Host Based IDS(HIDS):

HIDS can be installed in individual workstations and or servers to watch for appropriate or anomalous and inside attacks. They are usually used to make sure that the users do not accidentally delete the system files, reconfigure important settings or put the system at risk in any other way.

On the Basis of Nature:

Passive IDS:

In a passive system, the IDS detects a potential security breach, logs the information, and signals an alert that is no direct action is taken by the system.

Reactive IDS:

In a Reactive IDS, the IDS can respond in several ways to the suspicious activity such as logging the user off the system, closing down the connection, or even reprogramming the firewall to block network traffic from a suspected malicious source.

Principle of Intrusion Detection System

The incorporation of monitoring & detection of possible threats to the network provide cooperation with the availability to ensure the following:

Protected information asserts are not accessed by unauthorized entity:

Even if this does happen there is a clear audit record by installing IDS within the cooperate network one can offer protection to that information without a need for a secure gateway.

The availibility to monitor network traffic without impact to the network:

A secure gateway intrusive all the data packets must pass through it before they can be transmitted to the remote network.

Secrity professionals are able to understand the attacks on the network and build system to resist these attacks:

Review the information captured by the intrusion monitoring system can assist in the process to improve the level of information security and decrease the list of losses.

Actively responds to attacks on the system:

If implemented property intrusion monitoring system has the availability to perform specific actions when an event takes place. Those actions range from notification to automatic reconfiguration of devices and blocking a connection at the network level.


Discover more from easytechnotes

Subscribe to get the latest posts sent to your email.

Subscribe
Notify of
guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Scroll to Top