Posts

Showing posts with the label anomaly-based

Intrusion detection and prevention systems (IDS/IPS) concepts

 Intrusion detection and prevention systems (IDS/IPS) concepts. Intrusion Detection Systems (IDS) : IDS are like the "guard dogs" of a computer network. They monitor network traffic, searching for any suspicious or malicious activity. When they detect something fishy, they raise an alarm to alert the administrators. IDS can use various detection methods, such as signature-based detection (matching known attack patterns) or anomaly-based detection (identifying deviations from normal network behavior). Intrusion Prevention Systems (IPS) : IPS can be thought of as the "bouncers" of a network. They not only detect intrusions but also take action to prevent them. When an IPS identifies a potential attack, it can actively block the suspicious traffic, drop malicious packets, or modify network configurations to stop the attack in its tracks. Honey Pots : Imagine a honeypot as a "decoy" system, deliberately designed to attract attackers. It mimics vulnerable or va...