Talk With an Expert

How to Choose Intrusion Detection Solution

How to Choose Intrusion Detection Solution (PDF, 1.67MB)Published: 24 Jul, 2001
Created by
Baiju Shah

The evolution of the Internet has increased the need for security systems. An important security product that has emerged is Intrusion Detection Systems (IDS). In order to understand IDS properly, one must first have an understanding of intrusions. Intrusion is difficult to define because not everyone agrees on what is consider of an intrusion. Intrusions are defined as attempts to compromise confidentiality, integrity, or availability of data, or to bypass the security mechanisms of an IT system. An intrusion may be generally described as a sequence of related actions by a malicious adversary that results in the occurrence of unauthorized breaches to a target system or network. In the physical setting of a home, security cameras, motion detectors and burglar alarms are tools that can provide added security, but they cannot stop break-ins. Similarly, IDS devices can provide additional security for a computer or network but cannot stop intrusions. If security guards are monitoring the home, burglar alarm systems can provide assistance by calling police when an alarm goes off. Security professionals who react to an IDS alarm can provide additional depth to a line of defense therefore making it likely that the attacker will give up before much damage has been done.