IDS Detection Methods

Signature Detection The first form of detection or recognition is based on signature; this method is also sometimes called misuse detection. The system compares traffic to known models and when matches are found it reports the attack. Pattern matching is the most basic form of detecting and is used in many systems. The process relies … Read more

Signs of an Intrusion

what type of activities are indications of a potential attack? What type of actions can an IDS respond to? Let’s take a look at activities that may indicate an intrusion has occurred. Host System Intrusions What is an indicator of an attack on a host? A wide range of activities could be construed as an … Read more

The Inner Workings of an IDS

The main purpose of an IDS is to detect and alert an administrator about an attack. The administrator can then determine, based on the information received from the IDS, what action to take. An IDS functions in the following way: The IDS monitors network activity for anomalies—that is, signatures or behaviors that may indicate an … Read more