Intrusion detection system
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) /ɪnˈtruːʒən dɪˈtɛkʃən ˈsɪstəm/ is a device or software application that monitors a network or systems for malicious activity or policy violations.
Etymology
The term "Intrusion Detection System" originates from the field of computer security, where intrusion refers to any malicious activity that attempts to breach a system's security policy. The term "detection" refers to the process of identifying such activities, and "system" refers to the combination of hardware and software used for this purpose.
Types of IDS
There are several types of Intrusion Detection Systems, including:
- Network Intrusion Detection System (NIDS): Monitors the traffic on the network it is connected to and alerts the system or network administrator about suspicious packets.
- Host-based Intrusion Detection System (HIDS): Runs on all computers or devices in the network with direct access to both the internet and the enterprise internal network.
- Perimeter Intrusion Detection System (PIDS): Installed at the outer boundary of the network to detect and deter intruders at the network perimeter.
Related Terms
- Intrusion Prevention System (IPS): A system that not only detects potential security breaches but also takes proactive steps to prevent them.
- Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- Cybersecurity: The practice of protecting systems, networks, and programs from digital attacks.
External links
- Medical encyclopedia article on Intrusion detection system
- Wikipedia's article - Intrusion detection system
This WikiMD article is a stub. You can help make it a full article.
Languages: - East Asian
中文,
日本,
한국어,
South Asian
हिन्दी,
Urdu,
বাংলা,
తెలుగు,
தமிழ்,
ಕನ್ನಡ,
Southeast Asian
Indonesian,
Vietnamese,
Thai,
မြန်မာဘာသာ,
European
español,
Deutsch,
français,
русский,
português do Brasil,
Italian,
polski