• Skip to main content
  • Skip to primary sidebar

crackthe.net

SINCE 2010

  • Hacking
  • Security
    • Cloud Security
    • Network Security
    • OS Security
    • OT Security
    • SoC Security
    • Web Security
  • VPN
    • Filesharing
    • Streaming
  • Hosting
crackthe.net / Security / Network Security / HIDS, HIDP, NIDS, NIDP

HIDS, HIDP, NIDS, NIDP

Classification

  • Network-based intrusion prevention system (NIPS): monitors the
    entire network for suspicious traffic by analyzing protocol activity.
  • Wireless intrusion prevention system (WIPS): monitor a wireless
    network for suspicious traffic by analyzing wireless networking
    protocols.
    Network behavior analysis (NBA): examines network traffic to identify
    threats that generate unusual traffic flows, such as distributed denial
    of service (DDoS) attacks, certain forms of malware and policy
    violations.
  • Host-based intrusion prevention system (HIPS): : an installed
    software package which monitors a single host for suspicious activity by
    analyzing events occurring within that host.

Detection methods

  • Signature-based detection: Signature-based IDS monitors packets in
    the Network and compares with pre-configured and pre-determined attack
    patterns known as signatures.
  • Statistical anomaly-based detection: An IDS which is anomaly-based
    will monitor network traffic and compare it against an established
    baseline. The baseline will identify what is “normal” for that network –
    what sort of bandwidth is generally used and what protocols are used.
    It may however, raise a False Positive alarm for legitimate use of
    bandwidth if the baselines are not intelligently configured.
  • Stateful protocol analysis detection: This method identifies
    deviations of protocol states by comparing observed events with
    “pre-determined profiles of generally accepted definitions of benign
    activity”.
  • Top 20 Network Security Tools
  • The Future of Network Security Is In The Cloud
  • Guide to Computer Network Security Free On Springer
  • Network Switch – Layer 2 Security Controls
  • Router – Layer 3 Security Controls
  • How to Stay Anonymous Online
  • Secure Access Service Edge (SASE)
  • Encrypted Network Analytics (ETA)
  • Deep Packet Inspection (DPI)

Primary Sidebar

posts

  • Best VPN Service Provider
  • Ethical Hacking Online Courses
  • IT Security Online Courses
  • CISSP Exam Preparation
  • CEH, LPT & OSCP Exam Preparation
  • Top Ethical Hacker Forums
  • Virtual Penetration Testing Labs
  • Managed WordPress Hosting
  • Best Public Torrent Sites
  • Best Filehoster
  • Seedbox Providers
  • WordPress Security
  • Premium Proxies (HTTP/S, SOCKS4/5)
  • Top 20 Network Security Tools

contact

If you have any questions, don’t hesitate to get in touch: mail [at] crackthe.net, XING or LinkedIn. You can also follow me on Twitter.
© 2010 - 2021 crackthe.net • Site Notice • Privacy Policy