Information systems
intrusion detection. Who uses it? Pretty much anyone using a firewall or
antivirus software. Intrusion detection works a few different ways. One way is
a network-based intrusion detection. This type of intrusion detection system
would be placed at different points within a network to monitor traffic between
devices on the network. Another type is host-based intrusion detection.
Host-based detection runs on individual devices within a network. Signature-based
intrusion detection is another type. This type of intrusion detection looks for
specific signatures traveling over the network, such as viruses, trojan horses,
or worms. Another type of intrusion detection is anomaly-based intrusion
detection. This detection method watches what normally goes across a network
for traffic and establishes a baseline. Once the baseline is established it
watches for anomalies, or traffic that is out of the ordinary being transmitted
over the network, as it compares to that baseline.
Intrusion
detection systems are able to keep a log on the system to alert system
administrators when an intrusion has been detected. They can also be set to
generate a pop-up window to alert that an intrusion was detected.
Intrusion
detection is just another tool to keep information safe within a network and
when it is being transmitted.
No comments:
Post a Comment