Home & Garden Personal Safety & Security

Components of an Intrusion Detection System

    • Intrusion detection systems can provide you with peace of mind.Ryouchin/Digital Vision/Getty Images

      Intrusion detection systems are at the core of the computer and network security business. To the uninitiated, they bear a passing resemblance to firewalls, though there is an important difference: While firewalls seek to improve security by limiting network access between separate networks, an IDS aims to find intrusions and malicious activity within the system.There are two major classes of these systems: network-based (NIDS) and host-based (HIDS). As the names suggest, NIDS methods involve scanning network traffic, while HIDS methods involve scanning the machines connected to the network themselves.

    Sensor/Agent

    • This is the component that actively monitors traffic and activity. The term sensor usually indicates network-based monitoring, whereas agent is more often used in description of host-based systems.

    Management Server

    • The management server is the device, either physical or software based, that the sensor or agent reports its findings to. Some management servers are configured to provide a more high-level view of activity analysis than the sensors themselves by using data gathered by the sensors to sniff out traffic that might not have been picked up as suspect. Further still, some smaller IDS deployments don't use a management server at all, though this is rare. Larger IDS deployments often use multiple management servers for a high level of overview.

    Database Server

    • A database server is the general vault for all information recorded by the sensors and management servers. This is basically the archive of the system where event logs reported and/or handled by sensors, agents or the management server are stored.

    Console

    • This is the end-user's connection to the system, where IT and Network Security professionals get their hands into things. Some consoles are designed strictly for administration and configuration purposes, such as tweaking sensors to look for a certain type of traffic, while others are solely for monitoring and analysis by a human.

    Connection

    • All these components may be connected to each other through the networks of the company or organization that runs the IDS, or they may be connected to a server devoted to security software management. In these cases, each piece of the system also utilizes a management interface to connect to the management server, and is not given permissions to pass traffic from said interface to any other network interfaces it may be connected to. This effectively hides the IDS behind a layer of obscurity, making it more difficult for a would-be malicious user to disable, bypass or otherwise marginalize the effectiveness of the system.

      The main drawbacks of such a setup are the inevitable increase in cost and maintenance hours that come with maintaining a separate network, and the mild hassle for administrators or users of having to interact with multiple PCs for monitoring and managing the organization's IDS.

SHARE
RELATED POSTS on "Home & Garden"
Energy-Saving Tips for Your Home
Energy-Saving Tips for Your Home
Using Video Surveillance System for Effective Monitoring
Using Video Surveillance System for Effective Monitoring
Facing Electrical Problems – Contact a Reliable San Diego Electrician
Facing Electrical Problems – Contact a Reliable San Diego Electrician
How to Get Rid of Black Stuff That Adheres to a Toilet Tank
How to Get Rid of Black Stuff That Adheres to a Toilet Tank
How to Build a Martial Arts Belt Display
How to Build a Martial Arts Belt Display
DIY Rodent Extermination
DIY Rodent Extermination
How to Remove Goo Gone Stains From Clothing
How to Remove Goo Gone Stains From Clothing
Universal Solar Products
Universal Solar Products
Reliable Attributes Of A Multi-functional Led Light Bar
Reliable Attributes Of A Multi-functional Led Light Bar
Types of Energy-Saving Light Bulbs
Types of Energy-Saving Light Bulbs
Components of an Intrusion Detection System
Components of an Intrusion Detection System
How to Light Soy Wickless Candles
How to Light Soy Wickless Candles
How to Kill Scorpions
How to Kill Scorpions
Tips To Keep Your Home Safe From Fire During The Holidays (and Year-round)
Tips To Keep Your Home Safe From Fire During The Holidays (and Year-round)
How to Kill a Rat in the Subfloor
How to Kill a Rat in the Subfloor
Wireless Gate Intercom - Why it is Best For Your Home and Business
Wireless Gate Intercom - Why it is Best For Your Home and Business
Choosing Right Fire Protection Can Prevent a Tragedy
Choosing Right Fire Protection Can Prevent a Tragedy
How to Compare Alarm System Monthly Service Fees
How to Compare Alarm System Monthly Service Fees
Learn How To Set Up Your Home Security Camera Equipment At Home
Learn How To Set Up Your Home Security Camera Equipment At Home
Protect Your Home With Reputable Wichita Locksmith Service
Protect Your Home With Reputable Wichita Locksmith Service
Homemade Natural Room Freshener
Homemade Natural Room Freshener

Leave Your Reply

*