IDS

IDS , IDS detection & It's Type

IDS , IDS detection & It's Type

by Rifat Afsar Chowdhury -
Number of replies: 0

An Intrusion Detection System (IDS) is a security tool used to monitor computer networks or systems for unauthorized access or malicious activities. It identifies potential security breaches by analysing network traffic, system logs, and other sources of data to detect patterns that may indicate an attack.

There are two types of IDS:

1. Network-based: Network-based IDS (NIDS) are placed at strategic points in the network to monitor traffic for suspicious behaviour. 

2.Host-based: Host-based IDS (HIDS) are installed on individual systems to monitor system activities, such as file changes and login attempts.

IDSs use a variety of detection techniques, including signature-based, anomaly-based, and heuristic-based methods. Signature-based IDSs rely on pre-defined patterns of known attacks or threats, while anomaly-based IDSs identify unusual behavior that may indicate an attack. Heuristic-based IDSs use a combination of rules and machine learning algorithms to identify potential threats.

Detection: Once an IDS detects an intrusion, it generates an alert, which can trigger an automated response or notify a security analyst for further investigation. Some IDSs also have the capability to block traffic or terminate connections in response to detected threats.

Component: IDSs are an important component of a comprehensive security strategy, but they are not fool proof. Attackers can use techniques such as encryption and obfuscation to evade detection, and IDSs can generate false positives or false negatives. Therefore, it is important to use IDSs in conjunction with other security measures, such as firewalls, antivirus software, and access controls, to provide a layered defence against cyber attacks.