Intrusion detection system (IDS)

R3zk0n Β· October 2, 2025

Contents
    • An IDS is a passive system designed to identify when a network breach or attack against the network is occurring.
      • Usually designed to inform a network administrator when a breach or attack has occurred through log files, SMS, and/or an email notification.
      • An IDS cannot prevent or stop a breach or attack on its own.
      • It receives a copy of all traffic and evaluates it against a set of standards:
        • Signature based: evaluates network traffic for known malware or attack signatures.
        • Anomaly based: evaluates network traffic for suspicious changes.
        • Policy based: evaluates network traffic against a specific declared security policy.
      • May be deployed at the host level.
        • Host-based intrusion detection system (HIDS).

    Intrusion prevention system (IPS).

    • An IPS is an active system designed stop a breach or attack from succeeding in damaging the network.
    • Usually designed to perform an action or set of actions to stop the malicious activity.
    • Will inform a network administrator through the use of log files, SMS, and’or email notification.
    • All traffic on the network segment flows through the IPS to either enter or leave the segment.
    • Like the IDS, all traffic is evaluated against a set of standards.
    • The best placement on the network is between a router (with a firewall) and the destination network segment.
    • It is programmed to make an active response to the situation.
      • Block the offending IP address.
      • Close down the vulnerable interface.
      • Terminate the network session.
      • Redirect the attack.

    Twitter, Facebook