Report this Article

Using intrusion detection system to combat unauthorized actions

  • Comments 0

Attacks on the information systems and networks can ruin them. The availability of assessment tools over the internet has made it easier for people to exploit information security.  Hackers can easily scan, monitor, identify and interfere in the systems. Firewalls are also capable of banning the illegal access that can destroy enterprise networks. Something has to be done to safeguard the back doors or cover the leakage in the system. Intrusion detection system is designed to take care of ineffective protection in the system.


An intrusion detection software is designed to check traffic of the network, monitor the suspicious activities and warn the system administrator. It might also respond against the malicious or inconsistent traffic by hindering the user or IP address from reaching the system.


There are many different types of IDS available proceeding towards the mission of managing the corrupted traffic in several ways. One can look for host-based (HIDS) and network-based (NIDS) systems for taking care of the network security. Besides, there are also IDS that monitors the movements by tracking the particular signatures. They detect the signatures of the well-known threats, which is similar to antivirus software. Assessments of the traffic patterns which are different from the baseline and checking for anomalies; IDS excellently checks and prevent against malware. Another highly appreciated feature of IDS is observing, alerting and it also plan out actions or responses against the threats.


Below mentioned is information about the type of intrusion detection



Network-based IDS: NIDS are installed on the tactical points or can be installed at points inside the network, so that it can be ordered to check the traffic on the network. Though in reality all incoming and outgoing traffic can be checked, doing this can affect speed of the computer network.


Signature Based: Signature based system checks the packets on the system and then performs the comparison combating the database of attributes or signatures from identified corrupted threats. This can be well associated with the anti-virus software’s malware detection. But there is a disadvantage associated with this system because a gap would be generated between the new identified threats and signature used for searching the threat that being used on IDS. The gap duration will prove beneficial for any new threat to attack.


Host-based IDS: HIDS works on individual devices or on the system. Its action begins by reviewing all the incoming and outgoing packets on the device only and signaling the administrator about any unauthorized activity.


Alex Smith Article's Source:

  • Posted On January 9, 2012
  • Published articles 10

Post Comment


Select Language:

en es fr it
de pt sv da
no fi nl ru
ja pl tr el