Chapter 5
Intrusion-Detection Systems
Chapter Objectives
After reading this chapter and completing the exercises, you will be able to do the following:
Explain how intrusion-detection systems work.
Implement strategies for preventing intrusion.
Identify and describe several popular intrusion-detection systems.
Define the term honeypot.
Identify and describe at least one honeypot implementation.
Introduction
Chapter 4, “Firewall Practical Applications,” discussed several firewall solutions that have built-in intrusion-detection systems (IDS). An IDS is designed to detect signs that someone is attempting to breach a system and to alert the system administrator that suspicious activity is taking place. A permutation of the IDS is the intrusion-prevention ...
Get Network Defense and Countermeasures: Principles and Practices, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.