Services

OM Electrical
Home  »  Services  »  IDS System

IDS System


  1. » An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.

  2. There are several ways to categorize an IDS:

  3. Misuse Detection Vs. Anomaly Detection: In Misuse detection, the IDS analyzes the information it gathers and compares it to large databases of attack signatures. Essentially, the IDS looks for a specific attack that has already been documented. Like a virus detection system, misuse detection software is only as good as the database of attack signatures that it uses to compare packets against. In Anomaly detection, the system administrator defines the baseline, or normal, state of the networks traffic load, breakdown, protocol, and typical packet size. The anomaly detector monitors network segments to compare their state to the normal baseline and look for anomalies.

  4. Network-Based Vs. Host-Based Systems:In a Network-Based System, or NIDS, the individual packets flowing through a network are analyzed. The NIDS can detect malicious packets that are designed to be overlooked by a firewalls simplistic filtering rules. In a Host-Based System, the IDS examines at the activity on each individual computer or host.

  5. Passive System Vs. Reactive System:In a Passive System, the IDS detects a potential security breach, logs the information and signals an alert. In a Reactive System, the IDS responds to the suspicious activity by logging off a user or by reprogramming the firewall to block network traffic from the suspected malicious source.