What is Intrusion Detection?
5
Figure 1 3 Multiple Snort sensors in the enterprise logging to a centralized database server.
1.1 What is Intrusion Detection?
Intrusion detection is a set of techniques and methods that are used to detect suspi 
cious activity both at the network and host level. Intrusion detection systems fall into
two basic categories: signature based intrusion detection systems and anomaly detec 
tion systems. Intruders have signatures, like computer viruses, that can be detected
using software. You try to find data packets that contain any known intrusion related
signatures or anomalies related to Internet protocols. Based upon a set of signatures
and rules, the detection system is able to find and log suspicious activity and generate
alerts. Anomaly based intrusion detection usually depends on packet anomalies
present in protocol header parts. In some cases these methods produce better results
compared to signature based IDS. Usually an intrusion detection system captures
data from the network and applies its rules to that data or detects anomalies in it.
Snort is primarily a rule based IDS, however input plug ins are present to detect
anomalies in protocol headers.






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

toronto web hosting

 

Our partners: PHP: Hypertext Preprocessor Cheap Web Hosting JSP Web Hosting Ontario Web Hosting  Jsp Web Hosting

Cheapest Web Hosting Java Hosting Cheapest Hosting

Visionwebhosting.net Business web hosting division of Vision Web Hosting Inc.. All rights reserved