Network Intrusion Detection Systems identify security threats by detecting evil activity such as scans, denial of service attacks and unauthorized access through the examination of network traffic.
This video gives an introduction to Network-based Intrusion Detection Systems.For more information, please visit; http://www.certifiedcommercialsecurity.com
2. Intrusion Detection is the process of monitoring computers or networks for unauthorized entrance, activity, or file modification. Intrusion Detection Systems (IDS) also be used to monitor network traffic, thereby detecting if a system is being targeted by a network attack such as a denial of service attack.
3. NIDS identify security threats by detecting evil activity such as scans, denial of service attacks and unauthorized access through the examination of network traffic.
4. NIDS tend to be more distributed than host-based IDS. They're installed at strategic points on the network to monitor traffic from and to all hosts on the network. They are responsible for monitoring a network, rather than a single host
5. Network-based IDS uses techniques like “packet-sniffing” to pull data from TCP/IP or other protocol packets traveling along the network.
6. NIDS analyzes data packets that travel over the actual network. These packets are examined and sometimes compared with empirical data to verify their nature- malicious or benign.
7. NIDS are now among the most typically used network based security tools. If a networked PC system isn't equipped with a NIDS the network directors might be unaware of many attacks that take place and only become mindful of a successful attack when it symptoms happens.
8. Network-based systems detects : A. Unauthorized Outsider Access When an unauthorized user logs in successfully, or attempts to log in, they are best tracked with host-based IDS. However, detecting the unauthorized user before their log on attempt is best accomplished with network-based IDS.
9. B. Bandwidth Theft/Denial of Service These attacks from outside the network single out network resources for abuse or overload. The packets that initiate/carry these attacks can best be noticed with use of network-based IDS.
10. In an environment supplied with a NIDS, when a successful or unsuccessful attack occurs, a security alert is generated and info is collected which might be invaluable as proof if action in the courts is to be taken or in preventing the attack from happening.
11. Thanks for Watching!!!! For More Information, Please Visit; www.certifiedcommercialsecurity.com