Intrusion Detection Systems (IDS) Part I – (network intrusions; attack symptoms; IDS tasks; and IDS architecture)

by Przemyslaw Kazienko Piotr Dorosz
Sept. 1, 2017 0 comments TechGenix Detection & Response hacking & cyberattacks

An Intrusion Detection System (abbreviated as IDS) is a defense system, which detects hostile activities in a network. The key is then to detect and possibly prevent activities that may compromise system security, or a hacking attempt in progress including reconnaissance/data collection phases that involve for example, port scans. One key feature of intrusion detection systems is their ability to provide a view of unusual activity and issue alerts notifying administrators and/or block a suspected connection. According to Amoroso [1], intrusion detection is “a process of identifying and responding to malicious activity targeted at computing and networking resources”. In addition, IDS tools are capable of distinguishing between insider attacks originating from inside the organization (coming from own employees or customers) and external ones (attacks and the thread posed by hackers).

http://techgenix.com/intrusion_detection_systems_ids_part_i__network_intrusions_attack_symptoms_i...