IDS - what is it?

IDS - what is it?How does it work?Intrusion Detection System - a software or hardware detection of attacks and malicious activity.They help networks and computer systems to give them a proper rebuff.To achieve this, IDS collects information from multiple sources, system or network.Then the IDS analyzes it to determine the presence of attacks.This article will attempt to answer the question: "IDS - what is it and what is it for?"

What are intrusion detection systems (IDS)

information systems and networks are constantly exposed to cyber-attacks.Firewalls and antivirus software to reflect all of these attacks is not enough, because they are only able to protect the "front door" of computer systems and networks.Other adolescents who imagines himself hackers constantly scouring the Internet in search of gaps in security systems.

Thanks to the World Wide Web at their disposal a lot of totally free of malicious software - any Slammer, slepperov and similar malicious programs.Service is professiona

l burglars are competing companies to neutralize each other.So systems that detect intrusion (intrusion detection systems), - a vital necessity.No wonder that every day they are more widely used.

elements IDS

Elements IDS include:

  • detector subsystem, the purpose of which - the accumulation of events network or computer system;
  • analysis subsystem that detects cyber attacks and dubious activity;
  • repository for storing information about the events and the results of the analysis of cyber attacks and unauthorized activities;
  • management console, with which you can set parameters IDS, monitor the status of the network (or computer system), have access to information about the subsystem analysis detected the attack and illegal actions.

In fact, many may ask, "How is translated IDS?"Translation from English sounds like "system that catches the hot intruders."

basic tasks to solve intrusion detection systems

Intrusion Detection System has two main objectives: the analysis of sources of information and appropriate response, based on the results of this analysis.To accomplish these tasks IDS system performs the following actions:

  • monitors and analyzes user activity;
  • deals audit system configuration and its weaknesses;
  • checks the integrity of critical system files and data files;
  • conducts a statistical analysis of the system states based on a comparison with those states that have taken place during the already known attacks;
  • audits the operating system.

which can provide intrusion detection system and that it can not afford

can use it to achieve the following:

  • improve the parameters of the integrity of the network infrastructure;
  • to track user activity on the date of its entry into the system and to the application of the harm it or making any unauthorized actions;
  • identify and inform about the change, or delete data;
  • automate the task of monitoring the Internet to find the most recent attacks;
  • detect errors in the system configuration;
  • detect the onset of the attack and notify.

The IDS can not do it:

  • to fill gaps in network protocols;
  • play a compensatory role in the case of weak authentication mechanisms and authentication in networks or computer systems that it monitors;
  • should also be noted that IDS is not always cope with the problems associated with the attacks at the packet level (packet-level).

IPS (intrusion prevention system) - a continuation of IDS

IPS stands for "intrusion prevention system."This advanced, more functional variety IDS.IPS IDS system reactivity (unlike usual).This means that they can not only identify, record and inform about the attack, but also has a protective function.These functions include a reset and blocking incoming traffic packets.Another feature of IPS is that they work online and can automatically block the attack.

Subspecies IDS by the method of monitoring

NIDS (ie IDS, which monitors the entire network (network)) engaged in the analysis of traffic across subnets and managed centrally.Proper positioning of several NIDS monitoring can be achieved fairly large size networks.

They work in promiscuous mode (ie check all incoming packets, and do not make it optional), subnet traffic comparing with the known attacks with its library.When an attack is identified or detected unauthorized activity, the administrator is sent an alarm.However, it should be mentioned that a large network with high traffic NIDS sometimes can not cope with all the test information packets.Therefore, there is a possibility that during the "rush hour", they can not recognize an attack.

NIDS (network-based IDS) - these are the systems that are easily integrated into new network topology as much impact on their operation, they do not have, being passive.They only fixed is recorded and notify unlike reactive type systems IPS, which were discussed above.However, it must also be said about the network-based IDS, this is the system that can not analyze the information subjected to encryption.This is a significant disadvantage because of the increasingly widespread introduction of virtual private network (VPN) to encrypt the information is increasingly being used by cybercriminals to attack.

also NIDS can not determine what happened as a result of the attack, it caused damage or not.All they afford - is to fix its beginning.Therefore, the administrator is forced to re-examine each case on their own attacks, to ensure that the attack succeeded.Another significant problem is that hardly captures the NIDS attack using fragmented packets.They are particularly dangerous because they can disrupt the normal operation of NIDS.What does this mean for the entire network or computer system, no need to explain.

HIDS (host intrusion detection system)

HIDS (IDS, monitoryaschie host (host)) serve only a specific computer.This, of course, provides much higher efficiency.HIDS analyzed two types of information: system logs and operating system audit results.They make a snapshot of system files and compare it with the earlier image.If the mission-critical system files have been changed or removed, then the administrator is sent an alarm.

HIDS A significant advantage is the ability to carry out their work in a situation where network traffic is susceptible encryption.This is possible because the are on the host (host-based) sources of information can be created before the data is amenable to encryption or after decryption at the destination host.

The disadvantages of this system include the ability to block it or even ban using certain types of DoS-attacks.The problem here is that some sensors and analysis tools HIDS are located on the host that is attacked, that is, they also attacked.The fact that resources are HIDS hosts whose work they monitor, too, is hardly a plus, as it is, of course, reduces their productivity.

Subspecies IDS on how to detect attacks

Method anomaly analysis method and the method signatures of policies - such subspecies on how to detect attacks is a system IDS.

analysis method signatures

In this case, the data packets are checked for signature attack.The signature of the attack - a corresponding event one of the samples, describing known attacks.This method is quite effective, when used as reports of false attacks are rare.

method anomalies

With his aid found unlawful actions on the network and host.Based on the history of the normal operation of the host and the network created special profiles with data about it.Then come into play special detectors that analyze events.Using different algorithms they produce an analysis of these events, comparing them with the "norm" in the profiles.The lack of need to accumulate a huge amount of attack signatures - a definite plus of this method.However, a considerable number of false alarms about the attacks of unusual, but quite legitimate network events - it is undoubtedly negative.

method politician

Another method is the method of attack detection policies.The essence of it - in the creation of the rules of network security, which, for example, can indicate the principle of interoperability among themselves and with the protocols used.This method is promising, but the difficulty is quite complicated process of database creation policies.

ID Systems will provide reliable protection of your network and computer systems

Group ID Systems is today one of the market leaders in the field of security systems for computer networks.It will provide you with reliable protection against cyber-villains.With protection systems ID Systems, you can not worry about your important data.This way you can enjoy life more because you have on your mind will be less anxiety.

ID Systems - feedback from staff

great team and, most importantly, of course - this is the correct attitude of the company to its employees.Everyone (even the fledgling beginners) have the opportunity for professional growth.However, for this, of course, you need to express themselves, and then everything will turn out.

healthy atmosphere in the team.Beginners are always around and all train show.No unhealthy competition is not felt.Employees who work in the company for many years, is pleased to share all the technical intricacies.They are friendly, even without a hint of condescension answer the most stupid questions inexperienced workers.In general, from a work ID Systems some positive emotions.

against the leadership pleasantly pleased.Also pleased that here, obviously, able to work with the staff because the staff is really highly matched.Employee almost unequivocal: they feel at work at home.