O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Summary

This chapter has provided an overview of intrusion detection technologies. It was concluded that IDSs can be subcategorized into two main divisions: network-based intrusion detection systems and host-based intrusion detection systems. The essence of network-based intrusion detection systems is in their purpose to analyze network traffic in real-time. They use raw packets traveling the network as the source of information and are most often implemented as standalone, dedicated devices that have one or more network interfaces running in a promiscuous mode. These systems usually feature an intrusion recognition module—either hardware or software—that uses one or more of the many analysis approaches, such as pattern matching, stateful ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required