0% found this document useful (0 votes)
11 views

IDS and IPS

The document discusses Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), highlighting their roles in monitoring and analyzing traffic for malicious activities. IDS generates alerts without blocking threats, while IPS actively blocks them in real-time. It also outlines the types of each system, including Network-Based and Host-Based variants, as well as detection methods like signature-based and anomaly-based detection.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

IDS and IPS

The document discusses Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), highlighting their roles in monitoring and analyzing traffic for malicious activities. IDS generates alerts without blocking threats, while IPS actively blocks them in real-time. It also outlines the types of each system, including Network-Based and Host-Based variants, as well as detection methods like signature-based and anomaly-based detection.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

INTRUSION

DETECTION
SYSTEM

INTRUSION
PREVENTION
SYSTEM
-Presented by
Kranta prajna Das
INTRUSION DETECTION SYSTEM (IDS)

• Monitors and analyses traffic to detect malicious


activity and generate alerts without taking action
to block the threats.
• It plays a critical role in identifying unauthorized
access, attacks, or policy violations within a
system or network
TYPES OF INTRUSION DETECTION SYSTEM

TWO TYPES

NETWORK BASED IDS (NIDS) HOST BASED IDS (HIDS)

Monitors network traffic for malicious Monitors activities on individual systems


activities
INTRUSION DETECTION SYSTEM

HTTP VERB
TAMPERING

NETWORK BASED IDS (NIDS) HOST BASED IDS (HIDS)

Monitors network traffic for malicious Monitors activities on individual systems


activities
METHOD OF DETECTION

METHODS

SIGNATURE BASED DETECTION ANOMALY BASED DETECTION

Detects known threats by comparing Detects known or unknown threats by identifying

Network traffic against a database deviations from normal network behaviour

of known attack patterns


INTRUSION PREVENTION SYSTEM (IDS)

• Monitors and analyses traffic to detect malicious


traffic but also blocks it in real time to prevent
attacks.
• It actively monitors, detects, and prevents
suspicious activities or attacks.
TYPES OF INTRUSION PREVENTION SYSTEM

TWO TYPES

NETWORK BASED IPS (NIPS) HOST BASED IPS (HIPS)

Monitors network traffic and blocks Monitors and protects system activities on
malicious activities individual hosts
INTRUSION PREVENTION SYSTEM
THANK YOU

You might also like