An intrusion detection system (IDS) monitors traffic on your network, analyzes that traffic for signatures matching known attacks, and when something suspicious happens, you’re alerted. In the meantime, the traffic keeps flowing.
An intrusion prevention system (IPS) also monitors traffic. But when something unusual happens, the traffic stops altogether until you investigate and decide to open the floodgates again.
What will you vote for in the IDS vs. IPS debate? If you work in the IT space, you’ll probably be asked this question at some point in your career. And if you’re not sure how to answer right now, you’re certainly not alone.
Both systems have advantages and disadvantages. Because of that, some experts believe an IDS/IPS combination is the best way to protect a server.
You want to protect the assets on your server. But you don’t want to slow down the traffic, even if a problem occurs. An intrusion detection system (IDS) could be the solution you’ve been looking for.
Five main types of IDS exist.
No matter what type of IDS you choose, the underlying function is similar. You’ll use passive technology to detect an intrusion. When something is found, you’ll get an alert about it.
Your system might detect problems with:
A system like this comes with plenty of advantages. You can set one up very quickly, and it’s hard for attackers to spot your protections. But by the time you’re notified of an attack in progress, you may have lost valuable time you could use to protect your assets.
you want to stop an attack as soon as it’s discovered, even if that means closing down legitimate traffic for security concerns. An intrusion protection system (IPS) could be just right for you.
The goal of an IPS is to prevent damage. While you’re kept in the loop about the attack, the system is already working to keep things safe.
An IPS can protect against exterior intruders. But people within your organization can also take steps that harm your security. An IPS can protect against these actions too, so it can help train your employees about what is allowed and what is not.
Four main types of IPS exist:
Most administrators install an IPS right behind the firewall. But it’s clear that you can set up different configurations to protect your company’s assets in a very customized way.
No matter what type you choose, the IPS will take a predictable set of steps.
An IPS monitors your network for suspicious activity or attacks in progress. When an anomaly is spotted, you’re alerted. But in the interim, the system springs to action. It might:
The IPS works in real time, and the technology inspects every packet moving through the protected space. It can take swift and significant action in response to an attack, and while that can keep you protected, these systems can throw up false positives. When that happens, traffic can slow for no reason whatsoever.
At the end of an attack and cleanup, you have a report of what went wrong and what the system did to fix it. You can use this data to help you strengthen your system against a future attack. And you can walk back through the protections the system made and undo them if you feel they aren’t worthwhile.
Should you choose an IDS or an IPS? Let’s examine how they’re alike and what sets them apart.
Both systems can:
But they differ due to:
False positives. If an IDS gives you an alert about something that isn’t troublesome at all, you’re the only one inconvenienced. If an IPS shuts down traffic, many people could be impacted.
Many companies avoid the IDS vs. IPS problem by deploying both solutions to protect their assets and servers.
Choose an option like this, and you could use the IPS for active network security while the IDS gives you a deep understanding of how the traffic moves across your network.
A solution like this gives you information you can build on to keep your entire system safe. But you’ll also avoid letting an attack go unchecked.
Intrusion Detection System (IDS). (January 2020). Geeks for Geeks.
What Is an Intrusion Detection System? How an IDS Spots Threats. (February 2018). CSO.
How Do Intrusion Detection Systems (IDS) Work? (May 2020). EC-Council.
Intrusion Detection and Prevention Systems. (September 2014). The InfoSec Handbook.
Intrusion Prevention System. (September 2019). Geeks for Geeks.
7 Ways to Get the Most from Your IDS/IPS. (April 2019). DarkReading.
Cyber: https://cyber0defense.com/
Source: https://www.okta.com/
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |