Monday, February 8, 2016

Introduction to Intrusion Detection Systems (IDS)

October 5, 2015 by  
Filed under IDS / IPS

An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network. IDS come in a variety of […]

Run Your Own vs. Hosted Security

July 22, 2015 by  
Filed under IDS / IPS

Using vulnerability scanners to regularly test for potential exploits is a strong addition to other security defenses such as firewalls and intrusion detection and prevention systems, but it’s not as simple as launching the scan and then assuming everything is taken care of. Users have to accurately interpret scan results, make sure the database the […]

Statistical Based IDS

June 27, 2015 by  
Filed under CISA Topics, IDS / IPS

Statistical anomaly based IDS– A statistical anomaly-based IDS establishes a performance baseline based on normal network traffic evaluations. It will then sample current network traffic activity to this baseline in order to detect whether or not it is within baseline parameters. If the sampled traffic is outside baseline parameters, an alarm will be triggered. Signature-based […]

What is a Trap Door?

May 17, 2015 by  
Filed under CISA Topics, IDS / IPS

A trap door is hidden software or hardware mechanism that permits system protection mechanisms to be circumvented. A virus is a program that can “infect” other programs by modifying them. Modification includes a copy of the virus program, which may infect other programs. Computer virus has similarity with biological virus, a biological virus infects the […]