Intrusion Detection System

Intrusion Detection System

  • Submitted By: mahaljr
  • Date Submitted: 02/10/2009 3:22 PM
  • Category: Business
  • Words: 1305
  • Page: 6
  • Views: 436

Intrusion Detection System

Jason Barnes

University of Phoenix

February 9, 2009

Intrusion Detection System
An Intrusion Detection System IDS, is a defense system, which detects hostile activities in a network. The key is then to detect and possibly prevent activities that may compromise system security or a hacking attempt in progress including reconnaissance, data collection phases that may involve port scans. One key feature of intrusion detection systems is their ability to provide a view of unusual activity and issue alerts notifying administrators and or block a suspected connection. Intrusion Detection System is a process of identifying and responding to malicious activity targeted at computing and networking resources. Intrusion Detection System tools are capable of distinguishing between insider attacks originating from inside the organization coming from employees or customers and even from outside attacks posed by hackers.
The main task of intrusion detection systems is defense of a computer system by detecting an attack and possibly repelling it. Detecting hostile attacks depends on the number and type of appropriate actions. Intrusion prevention requires a well selected combination of “baiting and trapping” aimed at both investigations of threats. Diverting the intruder’s attention from protected resources is another task. Both the real system and a possible trap system are constantly monitored. Data generated by intrusion detection systems is carefully examined for the detection of possible attacks. Once an intrusion has been detected, IDS issues alerts notifying administrators of this fact. The next step is undertaken either by the administrators or the IDS itself, by taking advantage of additional countermeasures such as specific block functions to terminate sessions, backup systems, routing connections to a system trap and legal infrastructure following the organization’s security. Among various IDS tasks, intruder identification...

Similar Essays