{"id":157,"date":"2017-09-02T15:39:00","date_gmt":"2017-09-02T15:39:00","guid":{"rendered":"https:\/\/www.7sec.com\/blog\/?p=157"},"modified":"2021-06-10T13:11:26","modified_gmt":"2021-06-10T13:11:26","slug":"the-purpose-of-intrusion-detection-and-prevention-systems","status":"publish","type":"post","link":"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/","title":{"rendered":"The Purpose of Intrusion Detection &#038; Prevention Systems"},"content":{"rendered":"\r\n<p>Intrusion Detection System (IDS) is a detective device designed to detect malicious (including policy-violating) actions. An Intrusion Prevention System (IPS) is primarily a preventive device designed not only to detect but also to block malicious actions.<\/p>\r\n\r\n\r\n\r\n<p>Depending on their physical location in the infrastructure, and the scope of protection required, the IDS and IPS fall into two basic types: network-based and host-based. Both have the same function and the specific type deployed depends on strategic considerations.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\"><strong>WHY ARE IDS and IPS necessary?<\/strong><\/h4>\r\n\r\n\r\n\r\n<p>The IDS and IPS devices employ technology, which analyses traffic flows to the protected resource in order to detect and prevent exploits or other vulnerability issues.<\/p>\r\n\r\n\r\n\r\n<p>These exploits can manifest themselves as ill-intended interactions with a targeted application or service. The goal is to interrupt and gain control of an application or a machine, thus enabling the attacker to disable the target causing a denial-of-service situation, or to gain access to rights and permissions available through the target.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">EVENT TYPES<\/h4>\r\n\r\n\r\n\r\n<p>There are four types of IDS and IPS events: true positive, true negative, false positive, and false negative. The goal of implementing an IDS or IPS is to achieve only true positives and true negatives.<\/p>\r\n\r\n\r\n\r\n<p>One should keep in mind that most implementations have false positives so monitoring engineers spend time investigating non-malicious events, and false negatives, which can lead to intrusions. Thus, a proper configuration of the system is of crucial importance as it must reflect the organization\u2019s traffic patterns.<\/p>\r\n\r\n\r\n\r\n<div class=\"wp-block-image filt_hue_50\">\r\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-163\" src=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids.png\" alt=\"\" width=\"625\" height=\"233\" srcset=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids.png 849w, https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids-300x112.png 300w, https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids-768x288.png 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/figure>\r\n<\/div>\r\n\r\n\r\n\r\n<p>IDS\u00a0are designed to provide readiness to prepare for and deal with cyber attacks. This is accomplished through information collected from a variety of systems and network sources, which is then analyzed for security problems. IDS are generally deployed with the purpose to monitor and analyze user and system activity, audit system configurations and vulnerabilities, assess the integrity of any critical system and data files, perform statistical analysis of activity patterns based on the matching to known attacks, detect abnormal activity and audit operating systems.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large filt_hue_50\"><img loading=\"lazy\" decoding=\"async\" width=\"811\" height=\"318\" class=\"wp-image-164\" src=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ips.png\" alt=\"\" srcset=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ips.png 811w, https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ips-300x118.png 300w, https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ips-768x301.png 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/figure>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n\r\n\r\n<p>The IPS is generally deployed in-line and analyses network packet traffic as it flows through. Thus, it is similar in function to an IDS \u2013 both attempt to match packet data against a signature database or detect anomalies against what is pre-defined as \u201cnormal\u201d traffic.<\/p>\r\n\r\n\r\n\r\n<p>In addition to this IDS functionality, an IPS does more than log and alert \u2013 It is usually used to react to detected anomalies. This reaction ability of the detections is what makes IPS more desirable than IDS in general.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">THE WHAT, WHERE AND WHO\u2019S OF IDS and IPS DEPLOYMENT<\/h4>\r\n\r\n\r\n\r\n<p>These questions are to be answered taking into account the specifics of one\u2019s environment. The most common locations for intrusion detection\/protection sensor are between the network and extranet, in the Demilitarized Zone (DMZ), between the servers and the user community, on the remote access, intranet, and database environment, establishing network perimeter, and covering all possible points of entry should be possible.<\/p>\r\n\r\n\r\n\r\n<p>Once placed, the sensors must be configured to report to the central management console, as dedicated administrators will manage the sensors, provide a new or updated signature, and review logs. In order to avoid data tampering, one must ensure the communication between the sensors and management console is secure.<\/p>\r\n\r\n\r\n\r\n<p>The proper identification of mission-critical systems and points of entry requires the following roles in an organization to be involved in any IDS\/IPS deployment:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Senior Management<\/li>\r\n<li>Information Security Officers<\/li>\r\n<li>Data owners<\/li>\r\n<li>Network Administrators<\/li>\r\n<li>Database Administrators<\/li>\r\n<li>Operating System Administrators<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>If the key people representing these roles are not involved, the resources won\u2019t be used efficiently and the resulting measure will be inadequate. It is strongly advisable to perform <a href=\"https:\/\/www.7sec.com\/blog\/vulnerability-assessment-know-your-weaknesses\/\" target=\"_blank\" rel=\"noopener\">Vulnerability and Risk Assessment<\/a> prior to implementing IDS or IPS.<\/p>\r\n\r\n\r\n\r\n<p>Once the IDS is up and operational, logs must be reviewed, and traffic must be tailored to meet the specific needs of the company. Remember, traffic that may be perceived as abnormal by the IDS\/IPS may be perfectly suitable for the environment. IDS\/IPS must be properly maintained and configured.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">WHY CHOOSE A VENDOR?<\/h4>\r\n\r\n\r\n\r\n<p>There are times when you may feel you lack the knowledgeable staff to deploy and administer the IDS\/IPS. Here the vendors come in. Instead of spending a considerable amount of time and money trying to figure out the how\u2019s and why\u2019s, specialized teams can come to the aid, with the required expertise to get you started and train your personnel.<\/p>\r\n\r\n\r\n\r\n<p>When choosing a vendor, look for a team that:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Eliminates false positives by systematic tuning of detection to meet the characteristics of the particular system;<\/li>\r\n<li>Eliminates false negatives. Eliminating false positive alarms may result in incurring false negatives, and that must not happen;<\/li>\r\n<li>Understands what constitutes a security-relevant event and develop proper reporting;<\/li>\r\n<li>Installs and configures a complete solution;<\/li>\r\n<li>Provides and devises methods to test IDS\/IPS;<\/li>\r\n<li>Determines the damage caused by a detected attack, limits further damage, and recovers from the attack;<\/li>\r\n<li>Makes your systems scalable to the size required.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Intrusion Detection System (IDS) is a detective device designed to detect malicious (including policy-violating) actions. An Intrusion Prevention System (IPS) is primarily a preventive device designed not only to detect but also to block malicious actions. Depending on their physical location in the infrastructure, and the scope of protection required, the IDS and IPS fall &hellip; <a href=\"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The Purpose of Intrusion Detection &#038; Prevention Systems&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,3],"tags":[84,86,87,85,88,75],"class_list":["post-157","post","type-post","status-publish","format-standard","hentry","category-compliance","category-integration","tag-ids","tag-intrusion-detection-system","tag-intrusion-prevention-system","tag-ips","tag-risk-assessment","tag-vulnerability-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Purpose of Intrusion Detection &amp; Prevention Systems - Information Security Blog - 7Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Purpose of Intrusion Detection &amp; Prevention Systems - Information Security Blog - 7Security\" \/>\n<meta property=\"og:description\" content=\"Intrusion Detection System (IDS) is a detective device designed to detect malicious (including policy-violating) actions. An Intrusion Prevention System (IPS) is primarily a preventive device designed not only to detect but also to block malicious actions. Depending on their physical location in the infrastructure, and the scope of protection required, the IDS and IPS fall &hellip; Continue reading &quot;The Purpose of Intrusion Detection &#038; Prevention Systems&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Security Blog - 7Security\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-02T15:39:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-10T13:11:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids.png\" \/>\n<meta name=\"author\" content=\"madmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"madmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/\",\"url\":\"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/\",\"name\":\"The Purpose of Intrusion Detection & Prevention Systems - Information Security Blog - 7Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids.png\",\"datePublished\":\"2017-09-02T15:39:00+00:00\",\"dateModified\":\"2021-06-10T13:11:26+00:00\",\"author\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/#primaryimage\",\"url\":\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids.png\",\"contentUrl\":\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids.png\",\"width\":849,\"height\":318},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.7sec.com\/blog\/#website\",\"url\":\"https:\/\/www.7sec.com\/blog\/\",\"name\":\"Information Security Blog - 7Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.7sec.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65\",\"name\":\"madmin\",\"sameAs\":[\"https:\/\/www.7sec.com\/blog\"],\"url\":\"https:\/\/www.7sec.com\/blog\/author\/madmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Purpose of Intrusion Detection & Prevention Systems - Information Security Blog - 7Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/","og_locale":"en_US","og_type":"article","og_title":"The Purpose of Intrusion Detection & Prevention Systems - Information Security Blog - 7Security","og_description":"Intrusion Detection System (IDS) is a detective device designed to detect malicious (including policy-violating) actions. An Intrusion Prevention System (IPS) is primarily a preventive device designed not only to detect but also to block malicious actions. Depending on their physical location in the infrastructure, and the scope of protection required, the IDS and IPS fall &hellip; Continue reading \"The Purpose of Intrusion Detection &#038; Prevention Systems\"","og_url":"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/","og_site_name":"Information Security Blog - 7Security","article_published_time":"2017-09-02T15:39:00+00:00","article_modified_time":"2021-06-10T13:11:26+00:00","og_image":[{"url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids.png","type":"","width":"","height":""}],"author":"madmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"madmin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/","url":"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/","name":"The Purpose of Intrusion Detection & Prevention Systems - Information Security Blog - 7Security","isPartOf":{"@id":"https:\/\/www.7sec.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids.png","datePublished":"2017-09-02T15:39:00+00:00","dateModified":"2021-06-10T13:11:26+00:00","author":{"@id":"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/#primaryimage","url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids.png","contentUrl":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids.png","width":849,"height":318},{"@type":"WebSite","@id":"https:\/\/www.7sec.com\/blog\/#website","url":"https:\/\/www.7sec.com\/blog\/","name":"Information Security Blog - 7Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.7sec.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65","name":"madmin","sameAs":["https:\/\/www.7sec.com\/blog"],"url":"https:\/\/www.7sec.com\/blog\/author\/madmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts\/157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/comments?post=157"}],"version-history":[{"count":8,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts\/157\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts\/157\/revisions\/324"}],"wp:attachment":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/media?parent=157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/categories?post=157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/tags?post=157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}