O'Reilly logo

Network Security First-Step, Second Edition by Donald Stoddard, Thomas M. Thomas

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Intrusion Detection and Honeypots

...I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We’ve created life in our own image....

—Stephen Hawking

By the end of this chapter, you should know and be able to explain the following:

• The essentials of an intrusion detection system (IDS) and why is it necessary even if you have a firewall

• The difference between an IDS and intrusion prevention system (IPS)

• The difference between a network intrusion detection system (NIDS) and a host intrusion detection system (HIDS)

• How an IDS detects intrusions (that is, attacks) and the potential ways a response can occur

• Some of the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required