Immunity’s Host Intrusion Prevention Systems service helps to prevention of hackers intruding the clients computers. There are various kinds of systems that can be used for intrusion deduction, each of these systems are unique when it comes to the features and benefits.
Also known as IDS, this is a service that helps in the inspection of external as well as internal activities that is taking place in the network. It also helps in the determination of any kind of behaviour which is suspicious which is taking place. In case someone tries to hack or attack the network, these softwares are designed to keep a track of such activities as well as keeps a watchful eye if someone is trying to hack into the network or system. The categorization of ID can be into various sub categories.
There are various techniques that can be used for intrusion detection, they are as follows: –
Misuse detection system
This is one of the basic kinds of intrusion detection tools or techniques used which helps to analyse the information or data that is collected. After the collection of the data, it then goes ahead and makes a comparison based on the various techniques that can be used for intrusion detection as well compares different kinds of attack prototype data that is collected.
Types of techniques used for Intrusion Detection
This is another kind of techniques that can be used for intrusion detection. In this kind of technique, the administrator can set a baseline that is required, transfer the necessary data from the network, crashes as well as protocols and various other things.
Network Based IDS
Else known as NIDs, this is a kind of technique that is used to analyse the various kinds of packets that individually flow into the network. It also helps to keep an eye on various packets which are suspicious and could be overlooked by any kind of firewalls.
Host Based System
Under this technique, it is used to inspect the various IDs that are logged on to the network. It also helps to keep a track on the various activities from a particular computer or host.
Passive Intrusion Detection System is also a very effective method to help determine any kind of movement which is suspicious. It helps to also identify any kind of violations that can occur which are against the rules of security, helps to register the various details of activities in the form of logs and helps in the notification of the same to the user about any kind of malicious actions or programs.
The various techniques which are mentioned above in their own ways are effective. It is based on your requirements to determines which kind of technique would be beneficial for you. Unlike the various firewalls that helps in the prevention of various kinds of intrusion on your computer.