SlideShare a Scribd company logo
1 of 2
Download to read offline
Why Use an IDPS?
Solution
Purpose and Scope
This publication seeks to assist organizations in understanding intrusion detection system (IDS)
and intrusion prevention system (IPS) technologies and in designing, implementing, configuring,
securing, monitoring, and maintaining intrusion detection and prevention systems (IDPS). It
provides practical, real-world guidance for each of four classes of IDPS products: network-
based, wireless, network behavior analysis, and host-based. The publication also provides an
overview of complementary technologies that can detect intrusions, such as security information
and event management software and network forensic analysis tools. It focuses on enterprise
IDPS solutions, but most of the information in the publication is also applicable to standalone
and small-scale IDPS deployments. This publication replaces NIST Special Publication 800-31,
Intrusion Detection Systems.
Uses of IDPS Technologies
IDPSs are primarily focused on identifying possible incidents. For example, an IDPS could
detect when an attacker has successfully compromised a system by exploiting a vulnerability in
the system. The IDPS could then report the incident to security administrators, who could
quickly initiate incident response actions to minimize the damage caused by the incident.3 The
IDPS could also log information that could be used by the incident handlers.4 Many IDPSs can
also be configured to recognize violations of security policies. For example, some IDPSs can be
configured with firewall ruleset-like settings, allowing them to identify network traffic that
violates the organization’s security or acceptable use policies. Also, some IDPSs can monitor file
transfers and identify ones that might be suspicious, such as copying a large database onto a
user’s laptop
In addition to identifying incidents and supporting incident response efforts, organizations have
found other uses for IDPSs, including the following:
Identifying security policy problems. An IDPS can provide some degree of quality control for
security policy implementation, such as duplicating firewall rulesets and alerting when it sees
network traffic that should have been blocked by the firewall but was not because of a firewall
configuration error.
Documenting the existing threat to an organization. IDPSs log information about the threats that
they detect. Understanding the frequency and characteristics of attacks against an organization’s
computing resources is helpful in identifying the appropriate security measures for protecting the
resources. The information can also be used to educate management about the threats that the
organization faces.
Deterring individuals from violating security policies. If individuals are aware that their actions
are being monitored by IDPS technologies for security policy violations, they may be less likely
to commit such violations because of the risk of detection.
Because of the increasing dependence on information systems and the prevalence and potential
impact of intrusions against those systems, IDPSs have become a necessary addition to the
security infrastructure of nearly every organization.
Key Functions of IDPS Technologies
There are many types of IDPS technologies, which are differentiated primarily by the types of
events that they can recognize and the methodologies that they use to identify incidents. In
addition to monitoring and analyzing events to identify undesirable activity, all types of IDPS
technologies typically perform the following functions:
Recording information related to observed events. Information is usually recorded locally, and
might also be sent to separate systems such as centralized logging servers, security information
and event management (SIEM) solutions, and enterprise management systems.
Notifying security administrators of important observed events. This notification, known as an
alert, occurs through any of several methods, including the following: e-mails, pages, messages
on the IDPS user interface, Simple Network Management Protocol (SNMP) traps, syslog
messages, and user-defined programs and scripts. A notification message typically includes only
basic information regarding an event; administrators need to access the IDPS for additional
information.
Producing reports. Reports summarize the monitored events or provide details on particular
events of interest.
Some IDPSs are also able to change their security profile when a new threat is detected. For
example, an IDPS might be able to collect more detailed information for a particular session after
malicious activity is detected within that session. An IDPS might also alter the settings for when
certain alerts are triggered or what priority should be assigned to subsequent alerts after a
particular threat is detected.

More Related Content

Similar to Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdf

Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetijctet
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...researchinventy
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)Netwax Lab
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructureAnton Chuvakin
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analyticsIJNSA Journal
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSIJNSA Journal
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemIOSR Journals
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Five IDS mistakes people make
Five IDS mistakes people makeFive IDS mistakes people make
Five IDS mistakes people makeAnton Chuvakin
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
 

Similar to Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdf (20)

46 102-112
46 102-11246 102-112
46 102-112
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
idps
idpsidps
idps
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
1776 1779
1776 17791776 1779
1776 1779
 
1776 1779
1776 17791776 1779
1776 1779
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Select idps
Select idpsSelect idps
Select idps
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Five IDS mistakes people make
Five IDS mistakes people makeFive IDS mistakes people make
Five IDS mistakes people make
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Idps
IdpsIdps
Idps
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
 

More from expressionnoveltiesk

The major place where grantic continental crust is manufactured is.pdf
The major place where grantic continental crust is manufactured is.pdfThe major place where grantic continental crust is manufactured is.pdf
The major place where grantic continental crust is manufactured is.pdfexpressionnoveltiesk
 
There seems to be some evidence supporting the idea of a political b.pdf
There seems to be some evidence supporting the idea of a political b.pdfThere seems to be some evidence supporting the idea of a political b.pdf
There seems to be some evidence supporting the idea of a political b.pdfexpressionnoveltiesk
 
The CSUN IEEE chapter is to choose a president, treasurer and secret.pdf
The CSUN IEEE chapter is to choose a president, treasurer and secret.pdfThe CSUN IEEE chapter is to choose a president, treasurer and secret.pdf
The CSUN IEEE chapter is to choose a president, treasurer and secret.pdfexpressionnoveltiesk
 
The atmosphere on earth contains nitrogen in a form that is unusable .pdf
The atmosphere on earth contains nitrogen in a form that is unusable .pdfThe atmosphere on earth contains nitrogen in a form that is unusable .pdf
The atmosphere on earth contains nitrogen in a form that is unusable .pdfexpressionnoveltiesk
 
explain how fungi acquire their nutrients. describe the basic body p.pdf
explain how fungi acquire their nutrients. describe the basic body p.pdfexplain how fungi acquire their nutrients. describe the basic body p.pdf
explain how fungi acquire their nutrients. describe the basic body p.pdfexpressionnoveltiesk
 
Define microbial growth. Ftsz and septum are important features of s.pdf
Define microbial growth.  Ftsz and septum are important features of s.pdfDefine microbial growth.  Ftsz and septum are important features of s.pdf
Define microbial growth. Ftsz and septum are important features of s.pdfexpressionnoveltiesk
 
Suppose that a nation has a labor force of 100 people. In January, A.pdf
Suppose that a nation has a labor force of 100 people. In January, A.pdfSuppose that a nation has a labor force of 100 people. In January, A.pdf
Suppose that a nation has a labor force of 100 people. In January, A.pdfexpressionnoveltiesk
 
For which of the following types of interpolation is it possible, in .pdf
For which of the following types of interpolation is it possible, in .pdfFor which of the following types of interpolation is it possible, in .pdf
For which of the following types of interpolation is it possible, in .pdfexpressionnoveltiesk
 
SOMEONE HELP Complete sentences, stating the differences and relati.pdf
SOMEONE HELP Complete sentences, stating the differences and relati.pdfSOMEONE HELP Complete sentences, stating the differences and relati.pdf
SOMEONE HELP Complete sentences, stating the differences and relati.pdfexpressionnoveltiesk
 
Recontruct the cultural differences argumentSolutionCultural d.pdf
Recontruct the cultural differences argumentSolutionCultural d.pdfRecontruct the cultural differences argumentSolutionCultural d.pdf
Recontruct the cultural differences argumentSolutionCultural d.pdfexpressionnoveltiesk
 
Question 12 20 pts Explain five criteria of Statement No. 52 in deter.pdf
Question 12 20 pts Explain five criteria of Statement No. 52 in deter.pdfQuestion 12 20 pts Explain five criteria of Statement No. 52 in deter.pdf
Question 12 20 pts Explain five criteria of Statement No. 52 in deter.pdfexpressionnoveltiesk
 
Please write a project proposal by seeing the following project repo.pdf
Please write a project proposal by seeing the following project repo.pdfPlease write a project proposal by seeing the following project repo.pdf
Please write a project proposal by seeing the following project repo.pdfexpressionnoveltiesk
 
Does a countrys Institutional and legal system play a major role i.pdf
Does a countrys Institutional and legal system play a major role i.pdfDoes a countrys Institutional and legal system play a major role i.pdf
Does a countrys Institutional and legal system play a major role i.pdfexpressionnoveltiesk
 
Most primate species    a. live in social groups.    b. live sol.pdf
Most primate species    a. live in social groups.    b. live sol.pdfMost primate species    a. live in social groups.    b. live sol.pdf
Most primate species    a. live in social groups.    b. live sol.pdfexpressionnoveltiesk
 
please do D E and F .C. Describe loads on Structures wl liui. . D..pdf
please do D E and F .C. Describe loads on Structures wl liui. . D..pdfplease do D E and F .C. Describe loads on Structures wl liui. . D..pdf
please do D E and F .C. Describe loads on Structures wl liui. . D..pdfexpressionnoveltiesk
 
Male, 40 y o. comes to the office. First scheduled the appointment fo.pdf
Male, 40 y o. comes to the office. First scheduled the appointment fo.pdfMale, 40 y o. comes to the office. First scheduled the appointment fo.pdf
Male, 40 y o. comes to the office. First scheduled the appointment fo.pdfexpressionnoveltiesk
 
Describe and discuss the 2 pathways for antigen processing exogenou.pdf
Describe and discuss the 2 pathways for antigen processing exogenou.pdfDescribe and discuss the 2 pathways for antigen processing exogenou.pdf
Describe and discuss the 2 pathways for antigen processing exogenou.pdfexpressionnoveltiesk
 
List and describe the authentication methods businesses use to protec.pdf
List and describe the authentication methods businesses use to protec.pdfList and describe the authentication methods businesses use to protec.pdf
List and describe the authentication methods businesses use to protec.pdfexpressionnoveltiesk
 
Let X equal the number of flips of a fair cointhat are required to.pdf
Let X equal the number of flips of a fair cointhat are required to.pdfLet X equal the number of flips of a fair cointhat are required to.pdf
Let X equal the number of flips of a fair cointhat are required to.pdfexpressionnoveltiesk
 
Let K be a field. Prove that every not trivial (not necessarily fini.pdf
Let K be a field. Prove that every not trivial (not necessarily fini.pdfLet K be a field. Prove that every not trivial (not necessarily fini.pdf
Let K be a field. Prove that every not trivial (not necessarily fini.pdfexpressionnoveltiesk
 

More from expressionnoveltiesk (20)

The major place where grantic continental crust is manufactured is.pdf
The major place where grantic continental crust is manufactured is.pdfThe major place where grantic continental crust is manufactured is.pdf
The major place where grantic continental crust is manufactured is.pdf
 
There seems to be some evidence supporting the idea of a political b.pdf
There seems to be some evidence supporting the idea of a political b.pdfThere seems to be some evidence supporting the idea of a political b.pdf
There seems to be some evidence supporting the idea of a political b.pdf
 
The CSUN IEEE chapter is to choose a president, treasurer and secret.pdf
The CSUN IEEE chapter is to choose a president, treasurer and secret.pdfThe CSUN IEEE chapter is to choose a president, treasurer and secret.pdf
The CSUN IEEE chapter is to choose a president, treasurer and secret.pdf
 
The atmosphere on earth contains nitrogen in a form that is unusable .pdf
The atmosphere on earth contains nitrogen in a form that is unusable .pdfThe atmosphere on earth contains nitrogen in a form that is unusable .pdf
The atmosphere on earth contains nitrogen in a form that is unusable .pdf
 
explain how fungi acquire their nutrients. describe the basic body p.pdf
explain how fungi acquire their nutrients. describe the basic body p.pdfexplain how fungi acquire their nutrients. describe the basic body p.pdf
explain how fungi acquire their nutrients. describe the basic body p.pdf
 
Define microbial growth. Ftsz and septum are important features of s.pdf
Define microbial growth.  Ftsz and septum are important features of s.pdfDefine microbial growth.  Ftsz and septum are important features of s.pdf
Define microbial growth. Ftsz and septum are important features of s.pdf
 
Suppose that a nation has a labor force of 100 people. In January, A.pdf
Suppose that a nation has a labor force of 100 people. In January, A.pdfSuppose that a nation has a labor force of 100 people. In January, A.pdf
Suppose that a nation has a labor force of 100 people. In January, A.pdf
 
For which of the following types of interpolation is it possible, in .pdf
For which of the following types of interpolation is it possible, in .pdfFor which of the following types of interpolation is it possible, in .pdf
For which of the following types of interpolation is it possible, in .pdf
 
SOMEONE HELP Complete sentences, stating the differences and relati.pdf
SOMEONE HELP Complete sentences, stating the differences and relati.pdfSOMEONE HELP Complete sentences, stating the differences and relati.pdf
SOMEONE HELP Complete sentences, stating the differences and relati.pdf
 
Recontruct the cultural differences argumentSolutionCultural d.pdf
Recontruct the cultural differences argumentSolutionCultural d.pdfRecontruct the cultural differences argumentSolutionCultural d.pdf
Recontruct the cultural differences argumentSolutionCultural d.pdf
 
Question 12 20 pts Explain five criteria of Statement No. 52 in deter.pdf
Question 12 20 pts Explain five criteria of Statement No. 52 in deter.pdfQuestion 12 20 pts Explain five criteria of Statement No. 52 in deter.pdf
Question 12 20 pts Explain five criteria of Statement No. 52 in deter.pdf
 
Please write a project proposal by seeing the following project repo.pdf
Please write a project proposal by seeing the following project repo.pdfPlease write a project proposal by seeing the following project repo.pdf
Please write a project proposal by seeing the following project repo.pdf
 
Does a countrys Institutional and legal system play a major role i.pdf
Does a countrys Institutional and legal system play a major role i.pdfDoes a countrys Institutional and legal system play a major role i.pdf
Does a countrys Institutional and legal system play a major role i.pdf
 
Most primate species    a. live in social groups.    b. live sol.pdf
Most primate species    a. live in social groups.    b. live sol.pdfMost primate species    a. live in social groups.    b. live sol.pdf
Most primate species    a. live in social groups.    b. live sol.pdf
 
please do D E and F .C. Describe loads on Structures wl liui. . D..pdf
please do D E and F .C. Describe loads on Structures wl liui. . D..pdfplease do D E and F .C. Describe loads on Structures wl liui. . D..pdf
please do D E and F .C. Describe loads on Structures wl liui. . D..pdf
 
Male, 40 y o. comes to the office. First scheduled the appointment fo.pdf
Male, 40 y o. comes to the office. First scheduled the appointment fo.pdfMale, 40 y o. comes to the office. First scheduled the appointment fo.pdf
Male, 40 y o. comes to the office. First scheduled the appointment fo.pdf
 
Describe and discuss the 2 pathways for antigen processing exogenou.pdf
Describe and discuss the 2 pathways for antigen processing exogenou.pdfDescribe and discuss the 2 pathways for antigen processing exogenou.pdf
Describe and discuss the 2 pathways for antigen processing exogenou.pdf
 
List and describe the authentication methods businesses use to protec.pdf
List and describe the authentication methods businesses use to protec.pdfList and describe the authentication methods businesses use to protec.pdf
List and describe the authentication methods businesses use to protec.pdf
 
Let X equal the number of flips of a fair cointhat are required to.pdf
Let X equal the number of flips of a fair cointhat are required to.pdfLet X equal the number of flips of a fair cointhat are required to.pdf
Let X equal the number of flips of a fair cointhat are required to.pdf
 
Let K be a field. Prove that every not trivial (not necessarily fini.pdf
Let K be a field. Prove that every not trivial (not necessarily fini.pdfLet K be a field. Prove that every not trivial (not necessarily fini.pdf
Let K be a field. Prove that every not trivial (not necessarily fini.pdf
 

Recently uploaded

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 

Recently uploaded (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 

Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdf

  • 1. Why Use an IDPS? Solution Purpose and Scope This publication seeks to assist organizations in understanding intrusion detection system (IDS) and intrusion prevention system (IPS) technologies and in designing, implementing, configuring, securing, monitoring, and maintaining intrusion detection and prevention systems (IDPS). It provides practical, real-world guidance for each of four classes of IDPS products: network- based, wireless, network behavior analysis, and host-based. The publication also provides an overview of complementary technologies that can detect intrusions, such as security information and event management software and network forensic analysis tools. It focuses on enterprise IDPS solutions, but most of the information in the publication is also applicable to standalone and small-scale IDPS deployments. This publication replaces NIST Special Publication 800-31, Intrusion Detection Systems. Uses of IDPS Technologies IDPSs are primarily focused on identifying possible incidents. For example, an IDPS could detect when an attacker has successfully compromised a system by exploiting a vulnerability in the system. The IDPS could then report the incident to security administrators, who could quickly initiate incident response actions to minimize the damage caused by the incident.3 The IDPS could also log information that could be used by the incident handlers.4 Many IDPSs can also be configured to recognize violations of security policies. For example, some IDPSs can be configured with firewall ruleset-like settings, allowing them to identify network traffic that violates the organization’s security or acceptable use policies. Also, some IDPSs can monitor file transfers and identify ones that might be suspicious, such as copying a large database onto a user’s laptop In addition to identifying incidents and supporting incident response efforts, organizations have found other uses for IDPSs, including the following: Identifying security policy problems. An IDPS can provide some degree of quality control for security policy implementation, such as duplicating firewall rulesets and alerting when it sees network traffic that should have been blocked by the firewall but was not because of a firewall configuration error. Documenting the existing threat to an organization. IDPSs log information about the threats that they detect. Understanding the frequency and characteristics of attacks against an organization’s computing resources is helpful in identifying the appropriate security measures for protecting the
  • 2. resources. The information can also be used to educate management about the threats that the organization faces. Deterring individuals from violating security policies. If individuals are aware that their actions are being monitored by IDPS technologies for security policy violations, they may be less likely to commit such violations because of the risk of detection. Because of the increasing dependence on information systems and the prevalence and potential impact of intrusions against those systems, IDPSs have become a necessary addition to the security infrastructure of nearly every organization. Key Functions of IDPS Technologies There are many types of IDPS technologies, which are differentiated primarily by the types of events that they can recognize and the methodologies that they use to identify incidents. In addition to monitoring and analyzing events to identify undesirable activity, all types of IDPS technologies typically perform the following functions: Recording information related to observed events. Information is usually recorded locally, and might also be sent to separate systems such as centralized logging servers, security information and event management (SIEM) solutions, and enterprise management systems. Notifying security administrators of important observed events. This notification, known as an alert, occurs through any of several methods, including the following: e-mails, pages, messages on the IDPS user interface, Simple Network Management Protocol (SNMP) traps, syslog messages, and user-defined programs and scripts. A notification message typically includes only basic information regarding an event; administrators need to access the IDPS for additional information. Producing reports. Reports summarize the monitored events or provide details on particular events of interest. Some IDPSs are also able to change their security profile when a new threat is detected. For example, an IDPS might be able to collect more detailed information for a particular session after malicious activity is detected within that session. An IDPS might also alter the settings for when certain alerts are triggered or what priority should be assigned to subsequent alerts after a particular threat is detected.