{"id":12507,"date":"2021-08-13T08:03:46","date_gmt":"2021-08-13T12:03:46","guid":{"rendered":"https:\/\/tsisupport.com\/?post_type=glossary&#038;p=12507"},"modified":"2022-01-28T00:02:33","modified_gmt":"2022-01-28T05:02:33","slug":"intrusion-detection-system","status":"publish","type":"glossary","link":"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system","title":{"rendered":"Intrusion Detection and Prevention Systems"},"content":{"rendered":"<h2><b>What is an Intrusion Detection System (IDS)<\/b><\/h2>\n<p>An intrusion detection system (IDS) is a device or software that is placed on a network to monitor network traffic for malicious activities using signatures that match known cyberattacks or policy violations. Policy violations and malicious activities are reported to an information system administrator or collected in a security information and event management (SIEM) system.<\/p>\n<p>An IDS is a network security solution that monitors traffic that is moving through the network and information systems to alert on any suspicious activity, known threats, or malicious activities. It is vital to have an intrusion detection system as a network security solution to allow IT personnel to be notified when an attack or other network intrusion is taking place to allow an immediate response to any malicious traffic.<\/p>\n<h2><b>What are the Different Types of Intrusion Detection System<\/b><\/h2>\n<h3><b>Network intrusion detection systems (NIDS)<\/b><\/h3>\n<p>Network-based intrusion detection systems (NIDS) are placed throughout a network to passively inspect traffic. NIDS can be software or hardware-based. Often NIDS have two network interfaces which include the promiscuous mode for monitoring network traffic and the other is for reporting.<\/p>\n<h3><b>Host-based intrusion detection systems (HIDS)<\/b><\/h3>\n<p>Host-based intrusion detection systems (HIDS) monitor and analyze the internal computing systems and network packets on interfaces. It monitors the computer infrastructure where it is installed and provides continuous information via reporting on the information system.<\/p>\n<h3><b>Perimeter intrusion detection system (PIDS)<\/b><\/h3>\n<p>A perimeter intrusion detection system (PIDS) is a device that detects any intrusions on the physical perimeter of an organization\u2019s property, building, or designated area.<\/p>\n<h3><b>Virtual Machine-based intrusion detection system (VIDS)<\/b><\/h3>\n<p>Virtual Machine-based intrusion detections system (VIDS) is deployed remotely from a virtual machine to provide intrusion detection monitoring and alerts usually for other virtual machines. The benefit is that it is isolated from the target machine.<\/p>\n<h3><b>Intrusion Detection and Prevention Systems (IDPS)<\/b><\/h3>\n<p>An intrusion detection and prevention system (IDPS) is software or a device that monitors network packets against a known cyber threat database that has signatures of cyberattacks. IDPS detects intrusions, alerts personnel or a SIEM on intrusions, and also can prevent the packets on the network from being delivered. IDPS are usually located in the same area of the network as firewalls which are generally between the internal network and external internet. IDPS take a proactive instead of a reactive role and will deny access to any network traffic that matches signatures of known security threats.<\/p>\n","protected":false},"featured_media":12592,"template":"","meta":{"_links_to":"","_links_to_target":""},"categories":[379],"glossaries":[377],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Intrusion Detection System | Intrusion Detection and Prevention Systems | TSI<\/title>\n<meta name=\"description\" content=\"What is an intrusion detection system (IDS)? Learn the different types of intrusion detection and prevention systems that can help you respond to malicious traffic.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intrusion Detection System | Intrusion Detection and Prevention Systems | TSI\" \/>\n<meta property=\"og:description\" content=\"What is an intrusion detection system (IDS)? Learn the different types of intrusion detection and prevention systems that can help you respond to malicious traffic.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-28T05:02:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Intrusion-Detection-System.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system\",\"name\":\"Intrusion Detection System | Intrusion Detection and Prevention Systems | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Intrusion-Detection-System.jpg\",\"datePublished\":\"2021-08-13T12:03:46+00:00\",\"dateModified\":\"2022-01-28T05:02:33+00:00\",\"description\":\"What is an intrusion detection system (IDS)? Learn the different types of intrusion detection and prevention systems that can help you respond to malicious traffic.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Intrusion-Detection-System.jpg\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Intrusion-Detection-System.jpg\",\"width\":750,\"height\":422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossaries\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/?post_type=glossary\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Intrusion Detection and Prevention Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intrusion Detection System | Intrusion Detection and Prevention Systems | TSI","description":"What is an intrusion detection system (IDS)? Learn the different types of intrusion detection and prevention systems that can help you respond to malicious traffic.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Intrusion Detection System | Intrusion Detection and Prevention Systems | TSI","og_description":"What is an intrusion detection system (IDS)? Learn the different types of intrusion detection and prevention systems that can help you respond to malicious traffic.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system","og_site_name":"TSI Support","article_modified_time":"2022-01-28T05:02:33+00:00","og_image":[{"width":750,"height":422,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Intrusion-Detection-System.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system","url":"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system","name":"Intrusion Detection System | Intrusion Detection and Prevention Systems | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Intrusion-Detection-System.jpg","datePublished":"2021-08-13T12:03:46+00:00","dateModified":"2022-01-28T05:02:33+00:00","description":"What is an intrusion detection system (IDS)? Learn the different types of intrusion detection and prevention systems that can help you respond to malicious traffic.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Intrusion-Detection-System.jpg","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Intrusion-Detection-System.jpg","width":750,"height":422},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?glossary=intrusion-detection-system#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Glossaries","item":"https:\/\/tsisupport.com\/tsistaging\/?post_type=glossary"},{"@type":"ListItem","position":3,"name":"Intrusion Detection and Prevention Systems"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/glossary\/12507"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/glossary"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/12592"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12507"},{"taxonomy":"glossaries","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fglossaries&post=12507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}