🛡️ Intrusion Detection and Prevention Systems (11.1.7)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

IDS (Intrusion Detection System)

A passive security appliance that performs real-time analysis of network traffic or system logs, configured with signature patterns to raise an alert when malicious activity is matched.

2
New cards

Signature-Based Detection

Matches activity against known patterns of malicious activity (like antivirus software). Requires constant updates.

3
New cards

Anomaly-Based Detection

Defines a baseline of normal traffic and alerts on anything that falls outside that baseline. Main drawback is a high level of false positives.

4
New cards

IDS Sensor Placement (Defense in Depth)

Typically positioned behind a firewall to monitor traffic entering and exiting a security zone, detecting suspicious activity the firewall missed.

5
New cards

Passive IDS Sensor Characteristic

Uses a sniffer (from a mirrored port/TAP), does not slow down traffic, and is undetectable by the attacker (no IP address on the monitored segment).

6
New cards

IPS (Intrusion Prevention System)

An active security appliance that provides an automatic response to network threats it matches (compared to the passive logging/alerting of an IDS).

7
New cards

Two Common IPS Preventive Measures

Ending the session (e.g., sending a TCP reset) or shunning (applying a temporary filter to block the attacker's IP address on the firewall).

8
New cards

Network Placement of an IPS-enabled Firewall

It is inline with the network, meaning all traffic passes through it, which makes it a potential single point of failure.

9
New cards

Host-Based IDS/IPS

Software agents that run on end systems to monitor application processes, data files, and log files for suspicious activity.