IDPSs typically record information related to observed events, notify security administrators of important observed events, and produce reports. Many IDPSs can also respond to a detected threat by attempting to prevent it from succeeding. They use several response techniques, which involve the IDPS stopping the attack itself, changing the security environment (e.g., reconfiguring a firewall), or changing the attack’s content.
Intrusion detection is the ability to identify, track, and stop unauthorized or malicious attacks before they can penetrate and damage your network. Intrusion detection capability is only one part of a complete data security model and complements existing components, such as firewalls, encryption mechanisms, strong authentication systems, etc.
Almost all intrusion detection technologies fall into two basic types of intrusion detection - network-based and host-based.
- A network-based intrusion detection system (IDS) monitors traffic flowing through a network, looking for patterns that indicate unauthorized or malicious activity is taking place.
- Host-based and network-based intrusion detection systems can prove invaluable in fortifying your defensive posture.

Oh my God, you mad freak! That's brilliant! That's actually really cool Thanks. Intrusion Detection
ReplyDelete