Intrusion detection systems (IDS) are used to defend restricted access to an organization's network. They can consist of either software or hardware. There are two types of IDS:
- Host-based IDS: This system traces the hosts' behaviors for any suspicious activities
- Network-based IDS: This system analyzes the network traffic for any intrusion and produces alerts
IDS uses two detection methods:
- Signature-based detection: Like anti-virus products, this type of detection is based on predefined patterns, such as sequences and signatures.
- Anomaly-based detection: This method of detection is based on the behaviors of activities. It is a dynamic approach that detects anomalies and suspicious activities, based on previously ...