9. Intrusion Detection System
9. Intrusion Detection System
1
NAQIB ULLAH KHAN | Lecturer Computer Science GPGC Bannu
INFORMATION SECURITY BSCS 8TH
Intrusion detection systems primarily use two key intrusion detection methods: signature-based
intrusion detection and anomaly-based intrusion detection.
1. Signature-based intrusion detection: Signature-based IDS solutions use fingerprints
of known threats to identify them. Once malware or other malicious content has been
identified, a signature is generated and added to the list used by the IDS solution to test
incoming content. This enables an IDS to achieve a high threat detection rate with no
false positives because all alerts are generated based upon detection of known-malicious
content. However, a signature-based IDS is limited to detecting known threats and is
blind to zero-day vulnerabilities.
2. Anomaly-based intrusion detection: It is the opposite—it’s designed to pinpoint
unknown attacks, such as new malware, and adapt to them on the fly using machine
learning. Machine learning techniques enable an intrusion detection system (IDS) to
create baselines of trustworthy activity—known as a trust model—then compare new
behavior to verified trust models. False alarms can occur when using an anomaly-based
IDS, since previously unknown yet legitimate network traffic could be falsely identified
as malicious activity.
3. Hybrid intrusion detection systems use signature-based and anomaly-based intrusion
detection to increase the scope of your intrusion prevention system. This enables you to
2
NAQIB ULLAH KHAN | Lecturer Computer Science GPGC Bannu
INFORMATION SECURITY BSCS 8TH
IDS vs Firewalls
Intrusion Detection Systems and firewalls are both cybersecurity solutions that can be deployed
to protect an endpoint or network. However, they differ significantly in their purposes.
An IDS is a passive monitoring device that detects potential threats and generates alerts,
enabling security operations center (SOC) analysts or incident responders to investigate and
respond to the potential incident. An IDS provides no actual protection to the endpoint or
network. A firewall, on the other hand, is designed to act as a protective system. It performs
analysis of the metadata of network packets and allows or blocks traffic based upon predefined
rules. This creates a boundary over which certain types of traffic or protocols cannot pass.
Since a firewall is an active protective device, it is more like an Intrusion Prevention System
(IPS) than an IDS. An IPS is like an IDS but actively blocks identified threats instead of simply
raising an alert. This complements the functionality of a firewall, and many next-generation
firewalls (NGFWs) have integrated IDS/IPS functionality. This enables them to both enforce
the predefined filtering rules (firewalls) and detect and respond to more sophisticated cyber
threats (IDS/IPS). Learn more about the IPS vs IDS debate here.
3
NAQIB ULLAH KHAN | Lecturer Computer Science GPGC Bannu
INFORMATION SECURITY BSCS 8TH
4
NAQIB ULLAH KHAN | Lecturer Computer Science GPGC Bannu