Sunday, May 21, 2017

Intrusion Detection - Week 10


Information systems intrusion detection. Who uses it? Pretty much anyone using a firewall or antivirus software. Intrusion detection works a few different ways. One way is a network-based intrusion detection. This type of intrusion detection system would be placed at different points within a network to monitor traffic between devices on the network. Another type is host-based intrusion detection. Host-based detection runs on individual devices within a network. Signature-based intrusion detection is another type. This type of intrusion detection looks for specific signatures traveling over the network, such as viruses, trojan horses, or worms. Another type of intrusion detection is anomaly-based intrusion detection. This detection method watches what normally goes across a network for traffic and establishes a baseline. Once the baseline is established it watches for anomalies, or traffic that is out of the ordinary being transmitted over the network, as it compares to that baseline.

Intrusion detection systems are able to keep a log on the system to alert system administrators when an intrusion has been detected. They can also be set to generate a pop-up window to alert that an intrusion was detected.

Intrusion detection is just another tool to keep information safe within a network and when it is being transmitted.

No comments:

Post a Comment