Intrusion detection system
IDS is a technology for network security which is used for detecting vulnerabilities exploits against a targeted application or network of organizations. It is a cybersecurity tool that monitors network traffic for suspicious activities. Data breach means a security incident where information is accessed without authorization of owner on the system.
Types os attack in a system:
1: Ransomware attacks
2: Brute force attack
3: DDos attack
IDS component:
a:) Network Intrusion Detection System(NIDS)
=> NIDS, also known as NIDS is a system that analyses the network activities like detects hacking activities, port scanning or even denial of services in many cases. NIDS is connected to a network, where all the traffic were directed to NIDS and then inspected against the rule that exists in its database.
b:) Host-based Intrusion Detection System(HIDS)
=> It is a system that run on the independent host or device of the network. HIDS monitors or analysis all the incoming and outgoing traffic packets from the device only where HIDS is implemented ans send an alert to the administrator if it detects any malicious or unusual activities. The working mechanism of this HIDS is like, it that the snapshot of the existing system and compare it with the previous system snapshot and send alert to the administrator if it found any changes or attacks.
There are also two main detecting methods of IDS:
a:)Signature-Based IDS:
These type of IDS detects that attacks on the basis of the specific signature or patterns, such as a byte or sequence in network traffic, that are termed to be malicious. It is fast and easy to configure and it easily detect known attacks. It cannot detects new attacks, if patterns and signature is not available.
b:) Anomaly-based IDS
These type of IDS detects the data that is incorrect, not valid, or generally abnormal on the traffic. This method uses of machine learning approaches to compare models of trustworthy behavious with new behavious because of rapid growth in malware and attack types.
Credit: Researchgate
Comments
Post a Comment