• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

News Intrusion Detection System "IDS"

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
27
Reaction score
45,548
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%
🛡️Intrusion Detection System "IDS" 🧑‍💻..

▪️It is a system that detects hacking attempts or gaining unauthorized access. This type of system depends on collecting and analyzing information to detect any suspicious activity.

▪️IDS is usually used to detect breaches and send an alert only, that is, when there is a suspicious movement it sends only an alert and leaves the necessary decision making and actions to the recipient of the alert.
▪️The alert is sent according to the settings added to the system. It can be sent to another system or sent to responsible persons.

📍There are several types of IDS depending on the domain used:

1️⃣ Network Intrusion Detection System “NIDS”:

This type is placed at the network level so that it collects and analyzes information from the communication traffic (traffic) at the network level for all communication packets (packets) passing through. The most famous example of NIDS is “Snort”.

2️⃣ Host-based Intrusion Detection System (HIDS):

“HIDS” is used at the device level so that it collects and analyzes information and then detects suspicious activities at the device level and not at the network level as in the previous type. One of the most famous examples of HIDS is OSSEC.

3️⃣ Perimeter Intrusion Detection System (PIDS):

This type is used at the infrastructure level until danger or access attempts are detected and then alarm devices are triggered accordingly. This type uses either electronics or advanced technologies such as: fiber optic technology.

4️⃣ VM-based Intrusion Detection System (VMIDS):

This type is used in a variety of virtual machines, or what is called (virtual machine). This type is considered modern and was created due to the frequent use of virtual machines recently.
 
Back
Top