SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThere is a wide variety of Intrusion Detection Systems currently available, from network based IDS' to host based IDS', commercial and freeware. It's difficult to determine exactly what best fits your organization. To establish what you should be using, as with anything else, is a process. If this is your first attempt at securing your organization it may take more time and effort than for one that has made security a priority over the years. It is important to note that an IDS is in no way an all inclusive security solution, but if implemented correctly it can assist in detecting unauthorized activity and alert personnel to take action in the event of a security breach. This paper will discuss the nature of an IDS and review the various types of IDS' on the market and the varied approaches taken to detect intruders. Also identified will be key steps an organization should undertake prior to implementing an IDS solution. Performing a risk assessment of your organization and understanding existing controls and control deficiencies are key steps in securing the organization. Finally there is discussion of various commercial IDS on the market today and the ever-evolving functionality of this technology.