internet.com
You are in the: Small Business Computing Channelarrow View Sites +
Small Business Technology
» ECommerce-Guide | Small Business Computing | Webopedia | WinPlanet |  »Close
Webopedia.com
Enter a word for a definition... ...or choose a computer category.
 
 

menu
   Home
   Term of the Day
   New Terms
   Pronunciation
   New Links
   Quick Reference
   Did You Know?
   Categories
   Tech Support
   Webopedia Jobs
   About Us
   Link to Us
   Advertising
  

talk to us
   Submit a URL
   Suggest a Term
   Report an Error

internet.com
Developer
Downloads
International
Internet Lists
Internet News
Internet Resources
IT
Linux/Open Source
Personal Technology
Small Business
Windows Technology
xSP Resources
Search internet.com
Advertise
Corporate Info
Newsletters
Tech Jobs
E-mail Offers
commerce
  Be a Commerce Partner
 
 
 
 
 
 
 
 
 
 
 
 
 
 

intrusion detection system
Last modified: Friday, December 13, 2002 

An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.

There are several ways to categorize an IDS:

  • misuse detection vs. anomaly detection: in misuse detection, the IDS analyzes the information it gathers and compares it to large databases of attack signatures. Essentially, the IDS looks for a specific attack that has already been documented. Like a virus detection system, misuse detection software is only as good as the database of attack signatures that it uses to compare packets against. In anomaly detection, the system administrator defines the baseline, or normal, state of the network’s traffic load, breakdown, protocol, and typical packet size. The anomaly detector monitors network segments to compare their state to the normal baseline and look for anomalies.
  • network-based vs. host-based systems: in a network-based system, or NIDS, the individual packets flowing through a network are analyzed. The NIDS can detect malicious packets that are designed to be overlooked by a firewall’s simplistic filtering rules. In a host-based system, the IDS examines at the activity on each individual computer or host.
  • passive system vs. reactive system: in a passive system, the IDS detects a potential security breach, logs the information and signals an alert. In a reactive system, the IDS responds to the suspicious activity by logging off a user or by reprogramming the firewall to block network traffic from the suspected malicious source.

Though they both relate to network security, an IDS differs from a firewall in that a firewall looks out for intrusions in order to stop them from happening. The firewall limits the access between networks in order to prevent intrusion and does not signal an attack from inside the network. An IDS evaluates a suspected intrusion once it has taken place and signals an alarm. An IDS also watches for attacks that originate from within a system.

E-mail this definition to a colleague

Sponsored listings

Symantec: Virus Security and Removal - Stop Zotob Virus now. Visit Symantec for updated information and resources.

Secure Enterprise IM Management - Secure business IM. Download free IMlogic and Office LCS enterprise IM white paper today.

Top Layer: Intrusion Detection Solutions - Provides businesses with network IPS service and performance against worms, viruses, trojans, DDoS attacks, and Microsoft vulnerabilities.


For internet.com pages about intrusion detection system . Also check out the following links!

Related Links

eSecurity Planet 
A resource for daily information on e-security targeted to IT managers. The site provides users with information from a variety of sources, including experts at security product and services firms, and the consultants who follow the security industry.

An Overview of Intrusion Detection Systems
A white paper from Xinetica Ltd.

Deploying an Effective Intrusion Detection System
Not surprisingly, as the Internet grows at a mind-boggling pace, so does the incidence of documented unlawful attacks on corporate resources.

Intrusion Detection FAQs
From the SANS Institute.

Intrusion Detection, Theory and Practice
This article gives an overview of several types of intrusion detection systems, and introduces the reader to some of the concepts and practices involved in intrusion detection.

Security Wars: Can Intrusion Detection Even the Score?
Are IDS capabilities keeping up with intrusion attacks?

SecurityTracker.com
Information on the latest security vulnerabilities, free SecurityTracker Alerts, and customized vulnerability notification services.

Sponsored listings

KnowledgeStorm: Intrusion Detection Software IT Solutions - Business technology search site offering software, service, reseller and hardware information on thousands of IT solutions.

KnowledgeStorm: Network Intrusion Detection (IDS) Software - Business technology search site offering software, service, reseller and hardware information on thousands of IT solutions.

related categories

Security

Software

related terms

access

CERT/CC

crack

cracker

defacement

DoS attack

geek

honeypot

IP spoofing

phreaking

port scanning

programmer

quarantine

sniffer


webopedia
Give Us Your
Feedback


Software
intrusion detection system Products


Shop by Top Models:
Computer Associates eTrust Intrusion Detection Elite Edition
1 store offers from $7229 - $7229

Computer Associates eTrust Intrusion Detection Standard Edition
1 store offers from $4824 - $4824

Computer Associates eTrust Intrusion Detection 3.0 Standard Edition Upgrade Version (License Only) Volume License for PC (5000 Session/s)
1 store offers from $13836 - $13836

Computer Associates eTrust Intrusion Detection Elite Edition
1 store offers from $1809 - $1809

Computer Associates eTrust Intrusion Detection Elite Edition
1 store offers from $4012 - $4012



JupiterWeb networks:

internet.comearthweb.comDevx.com graphics.com

Search JupiterWeb:

Jupitermedia Corporation has three divisions:
Jupiterimages, JupiterWeb and JupiterResearch


Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Jupitermedia Corporate Info | Newsletters | Tech Jobs | Shopping | E-mail Offers