An Intrusion Detection System (IDS) is a network security technology originally built for detecting vulnerability exploits against a target application or computer.
The IDS is also a listen-only device. The IDS monitors traffic and reports results to an administrator. It cannot automatically take action to prevent a detected exploit from taking over the system.
Attackers are capable of exploiting vulnerabilities quickly once they enter the network. Therefore, the IDS is not adequate for prevention. Intrusion detection and intrusion prevention systems are both essential to security information and event management.
The following table summarizes the differences between the IPS and the IDS deployment.
Intrusion Prevention System | IDS Deployment | |
---|---|---|
Placement in Network Infrastructure | Part of the direct line of communication (inline) | Outside direct line of communication (out-of-band) |
System Type | Active (monitor & automatically defend) and/or passive | Passive (monitor & notify) |
Detection Mechanisms | 1. Statistical anomaly-based detection 2. Signature detection: - Exploit-facing signatures - Vulnerability-facing signatures |
1. Signature detection: - Exploit-facing signatures |
Diagram depicting the difference between an IPS and an IDS
Diagram depicting the functionality of an intrusion detection system
An IDS only needs to detect potential threats. It is placed out of band on the network infrastructure. Consequently, it is not in the real-time communication path between the sender and receiver of information.
IDS solutions often take advantage of a TAP or SPAN port to analyze a copy of the inline traffic stream. This ensures that the IDS does not impact inline network performance.
When IDS was developed, the depth of analysis required to detect intrusion could not be performed quickly enough. The speed would not keep pace with components on the direct communications path of the network infrastructure.
Network intrusion detection systems are used to detect suspicious activity to catch hackers before damage is done to the network. There are network-based and host-based intrusion detection systems. Host-based IDSes are installed on client computers; network-based IDSes are on the network itself.
An IDS works by looking for deviations from normal activity and known attack signatures. Anomalous patterns are sent up the stack and examined at protocol and application layers. It can detect events like DNS poisonings, malformed information packets and Christmas tree scans.
An IDS can be implemented as a network security device or a software application. To protect data and systems in cloud environments, cloud-based IDSes are also available.
There are five types of IDS: network-based, host-based, protocol-based, application protocol-based and hybrid.
The two most common types of IDS are:
The remaining three types can be described as such:
There is also a subgroup of IDS detection methods, the two most common variants being:
IDses and Next-Generation Firewalls are both network security solutions. What differentiates an IDS from a firewall is its purpose.
An IDS device monitors passively, describing a suspected threat when it’s happened and signaling an alert. IDS watches network packets in motion. This allows incident response to evaluate the threat and act as necessary. It does not, however, protect the endpoint or network.
A firewall monitors actively, looking for threats to prevent them from becoming incidents. Firewalls are capable of filtering and blocking traffic. They allow traffic based on preconfigured rules, relying on ports, destination addresses and the source
Firewalls reject traffic that does not follow firewall rules. However, if an attack is coming from inside the network, the IDS will not generate an alert.
Diagram depicting the functionality of an intrusion detection system and a firewall
There are numerous techniques intruders may use to avoid detection by IDS. These methods can create challenges for IDSes, as they are meant to circumvent existing detection methods:
Cyberattacks are always increasing in complexity and sophistication, and Zero Day Attacks are common. As a result, network protection technologies must keep pace with new threats, and businesses must maintain high levels of security.
The objective is to assure secure, trusted communication of information. Therefore, an IDS is important to the security ecosystem. It operates as a defense for systems security when other technologies fail.
While IDSes are useful, they are extended in impact when coupled with IPSes. Intrusion Prevention Systems (IPS) add the ability to block threats. This has become the dominant deployment option for IDS/IPS technologies.
Better still is the blend of multiple threat prevention technologies to form a complete solution. An effective approach is a combination of:
These technologies combined constitute advanced threat protection. The service scans all traffic for threats (including ports, protocols and encrypted traffic). Advanced threat prevention solutions look for threats within the cyberattack lifecycle, not just when it enters the network. This forms a layered defense — a Zero Trust approach with prevention at all points.