Intrusion Detection Systems - Week 5
Intrusion Detection Systems - Week 5
Intrusion Detection Systems are designed to detect an alert individuals of malicious activities or attacks, IDS's come in two main forms; host-based IDS and network-based IDS.
Intrusion detection systems have sensors to detect security breaches, logs to record said events and a management console where you can configure the systems, view the logs to spot suspicious activities or just blacklist unauthorised connections.
Host-based IDS works on individual devices (hosts) within your network, acting as personal detectives for each device. They monitor activities on a specific device, looking for anything unusual or suspicious.
Network-based IDS, on the other hand, acts as a neighbourhood watch for your entire network. It watches the traffic flowing through your network, identifying patterns or known attack signatures.
Host based IDS
Network Based IDS
Access control determines who is allowed in your network and what actions they can perform, it restricts access to only authorised users. Auditing in the other hand records every action taken by a user within the system. This allows you to detect any unusual or suspicious activities.
Access Control
Auditing
Comments
Post a Comment