IDS and IPS explained

IDS and IPS explained

IDS : Intrusion Detection Systems.

An Intrusion Detection System (IDS) is a system that passively monitors the traffic on the network (by making a copy of the traffic). Once It detects a threat, it alerts and notifies the security team for further action.

How does an IDS work :

An IDS uses two methods of detection:

  • Signature based detection: it detects an attack by comparing the traffic to an existing database of signatures that refers to a type of attack or malicious behavior. When a match is found, the IDS raises an alert.
  • Anomaly based detection: which detects anomalies by monitoring the behavior of the traffic, it is particularly effective against new attacks that are not added to the signatures’ database yet.

Types of IDS:

There two main types of IDSs :?

  • Network intrusion detection systems (NIDS): it is placed within the company’s LAN, and examines a copy of all the traffic from all the devices of the network.
  • Host intrusion detection systems (HIDS): it is deployed at the endpoint level and monitors the activities on that host (running process, resource consumption, …)? to identify threats (like viruses, Trojan horses ..)


IPS : Intrusion Prevention Systems.

Just like an IDS, an IPS monitors and analyzes the traffic on a network to detect a threat. However, it goes a step further by taking to appropriate security measure to stop the threat.

How Does an IPS Work?

An IPS monitors network traffic in real-time and employs various security measures to counter identified threats. These measures can include:

  • Traffic Blocking: Preventing traffic from specific sources that are deemed suspicious.
  • Port Blocking: Shutting down access to certain ports that might be exploited.
  • Packet Dropping: Discarding malicious packets to prevent them from reaching their intended destination.
  • Alerting and Reporting: Notifying the appropriate personnel about detected threats and actions taken.

IPS automates actions to contain certain threats without the need of intervention from the security team.

One major difference between the IDS and the IPS, is that the IPS analyzes the original traffic instead of making a copy, this means the traffic goes through the IPS.

Types of IPS:

  • Network Intrusion Prevention Systems (NIPS): it analyzes the network traffic while comparing it to a database of attacks’ signatures, once it detects an attack it takes the necessary measures to stop it.
  • Host Intrusion Prevention Systems (HIPS): it analyzes the traffic going through and from the host to detect malicious behavior.

However, it's important to note that IPS may occasionally generate false positives, inadvertently blocking legitimate traffic due to its proactive nature.



By: Karim Belhadj


#cybersecurity #networking #network #IPS #IDS #security

Mourad A. HARIMA

Telco Cloud, 5G Engineer @LabLabee | 5GaaS | OpenRAN | AWS | SDN | NFV | Bash Scripting

1 年

Very helpful !

要查看或添加评论,请登录

Karim Belhadj的更多文章

  • How Do We Keep Our WI-FI Networks Secured?

    How Do We Keep Our WI-FI Networks Secured?

    Home WIFI networks are in a constant threat of being hacked. Think about how many machines are connect to you WIFI from…

  • Discovering Zero-Day Attacks

    Discovering Zero-Day Attacks

    What are Zero-Day Attacks? A Zero-Day attack occurs when threat actors exploit new and unaddressed vulnerabilities in a…

  • What Are Endpoint Detection and Response (EDR) Tools?

    What Are Endpoint Detection and Response (EDR) Tools?

    Endpoint Detection and Response (EDR), also known as Endpoint Threat Detection and Response (ETDR), is a tool that…

  • What Are Password Managers and How Do They Work?

    What Are Password Managers and How Do They Work?

    In most cases, people have two types of passwords: One complex password that they use for all their needs. Multiple…

    2 条评论
  • What Zero Trust Security?

    What Zero Trust Security?

    Conventional security models operate on an outdated assumption that everything within an organization’s network is…

    2 条评论
  • Sandbox in cybersecurity

    Sandbox in cybersecurity

    In the ever-evolving landscape of cybersecurity, staying ahead of malicious threats is crucial. One valuable tool that…

  • What Is A Web Application Firewall (WAF)

    What Is A Web Application Firewall (WAF)

    In the world of cybersecurity, Web Application Firewalls (WAFs) are like strong shields that protect websites from…

  • Forward Proxy Server VS Reverse Proxy Server

    Forward Proxy Server VS Reverse Proxy Server

    Hello everyone and welcome, In this article, we'll unravel the concepts of forward and reverse proxies – two essential…

    2 条评论
  • Monitoring the Active Directory | ADS EP10 (Last Episode)

    Monitoring the Active Directory | ADS EP10 (Last Episode)

    In this post we will talk about monitoring and auditing your active directory, and I will use the Domain Admin Group as…

  • NTLM vs KERBEROS (Forcing NTLMv2) | ADS EP9

    NTLM vs KERBEROS (Forcing NTLMv2) | ADS EP9

    KERBEROS and NTLM are both authentication protocols used in Windows Active Directory (AD) environments to verify user…

社区洞察

其他会员也浏览了