Intrusion detection
From Wikipedia, the free encyclopedia
In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions.
Intrusion detection can be performed manually or automatically. Manual intrusion detection might take place by examining log files or other evidence for signs of intrusions, including network traffic. A system that performs automated intrusion detection is called an Intrusion Detection System (IDS). An IDS can be either host-based, if it monitors system calls or logs, or network-based if it monitors the flow of network packets. Modern IDSs are usually a combination of these two approaches. Another important distinction is between systems that identify patterns of traffic or application data presumed to be malicious (misuse detection systems), and systems that compare activities against a 'normal' baseline (anomaly detection systems).
When a probable intrusion is discovered by an IDS, typical actions to perform would be logging relevant information to a file or database, generating an email alert, or generating a message to a pager or mobile phone.
Determining what the probable intrusion actually is and taking some form of action to stop it or prevent it from happening again are usually outside the scope of intrusion detection. However, some forms of automatic reaction can be implemented through the interaction of Intrusion Detection Systems and access control systems such as firewalls.
Some authors classify the identification of attack attempts at the source system as Extrusion Detection (also known as Outbound Intrusion Detection) techniques.
[edit] Resources
For more information about intrusion detection and intrusion prevention:
"Network Intrusion Detection", 3rd ed. ISBN 0-7357-1265-4
ACM's Introduction to Intrusion Detection
CERT Intruder Detection Checklist
SANS Intrusion Detection Systems FAQ