Intrusion Detection System

385 Words2 Pages
With the evolution of technology in the last few decades, usage of computer systems and internet has increased along with their complexity and security. This has led to the development of automated systems like Intrusion Detection System (IDS) to detect malicious attacks on individual computers and on networks. This aim of this document is to outline the use and methods of IDS to detect intrusions for an organization network and also to propose a new solution or method. Intrusion Detection is a type of act which detects any malicious activity that occurred due to outsider with illegal authorization and insider who misuses his access privileges. These are referred to as hackers and insider threats respectively. IDS is a software or a physical device which can detect these malicious traffic on network such as traffic that is violating security policies, illegal authorization and alert them to the system administration for further precautions. IDS tools also have the ability to store the detected attack which can be revised later and make changes in the safety control policies accordingly. Intrusion detection and prevention system (IDPS) is an extended IDS tool which in addition to detecting and notifying a threat, it also stops or blocks the threat. IDPS tools have become necessary for every organization to safe guard their infrastructure, detecting issues with the security policies, documenting them and also preventing individuals from violating security policies. Why is it necessary?? A number of contributions have been made to the system security by Intrusion Detection System, but still a justification on why it is necessary for an organization or an individual. We will have a look on few reasons towards it. o Security is main issue for any organization to keep their data safe, IDS system helps in defending the system from attackers by implementing methods to
Open Document