Intrusion Detection System
Intrusion Detection System
Intrusion Detection System
A system called an intrusion detection system (IDS) observes network traffic for malicious
transactions and sends immediate alerts when it is observed. It is software that checks a
network or system for malicious activities or policy violations. Each illegal activity or
violation is often recorded either centrally using a SIEM system or notified to an
administration. IDS monitors a network or system for malicious activity and protects a
computer network from unauthorized access from users, including perhaps insiders. The
intrusion detector learning task is to build a predictive model (i.e. a classifier) capable of
distinguishing between ‘bad connections’ (intrusion/attacks) and ‘good (normal)
connections’.
Host Intrusion Detection System (HIDS): Host intrusion detection systems (HIDS)
run on independent hosts or devices on the network. A HIDS monitors the incoming
and outgoing packets from the device only and will alert the administrator if suspicious
or malicious activity is detected. It takes a snapshot of existing system files and
compares it with the previous snapshot. If the analytical system files were edited or
deleted, an alert is sent to the administrator to investigate. An example of HIDS usage
can be seen on mission-critical machines, which are not expected to change their
layout.
Benefits of IDS
Detects malicious activity: IDS can detect any suspicious activities and alert the
system administrator before any significant damage is done.
Improves network performance: IDS can identify any performance issues on the
network, which can be addressed to improve network performance.
Compliance requirements: IDS can help in meeting compliance requirements by
monitoring network activity and generating reports.
Provides insights: IDS generates valuable insights into network traffic, which can be
used to identify any weaknesses and improve network security.
Detection Method of IDS
1. Signature-based Method: Signature-based IDS detects the attacks on the basis of
the specific patterns such as the number of bytes or a number of 1s or the number of
0s in the network traffic. It also detects on the basis of the already known malicious
instruction sequence that is used by the malware. The detected patterns in the IDS are
known as signatures. Signature-based IDS can easily detect the attacks whose pattern
(signature) already exists in the system but it is quite difficult to detect new malware
attacks as their pattern (signature) is not known.
2. Anomaly-based Method: Anomaly-based IDS was introduced to detect unknown
malware attacks as new malware is developed rapidly. In anomaly-based IDS there is
the use of machine learning to create a trustful activity model and anything coming is
compared with that model and it is declared suspicious if it is not found in the model.
The machine learning-based method has a better-generalized property in comparison
to signature-based IDS as these models can be trained according to the applications
and hardware configurations.
Comparison of IDS with Firewalls
IDS and firewall both are related to network security but an IDS differs from a firewall as a
firewall looks outwardly for intrusions in order to stop them from happening. Firewalls
restrict access between networks to prevent intrusion and if an attack is from inside the
network it doesn’t signal. An IDS describes a suspected intrusion once it has happened
and then signals an alarm.