Skip to main content

Intrusion Detection System


aliases:

  • IDS

A hardware device designed to monitor and protect computer networks from suspicious, malicious, and prohibited network activity.

IDS' can be configured to adhere to a security policy created by an organization by the network admin. IDS use signature patterns derived from the policy to detect various types of malicious activity within a traffic stream.

Anomaly-Based Detection

For anomaly-based detection, the IDS is configured with a baseline for network traffic. Anything outside of that baseline is closely monitored and generates alerts. However, this method is highly unreliable since it generates a lot of false positives.

Configuration

IDSs need to be configured with a packet sniffer to read frames from a mirrored port or TAP, where the aim is to detect malicious traffic that has gotten past the firewalls, providing defense in depth.

#XIV