Jump to content

Network intrusion detection system

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Mesoderm (talk | contribs) at 00:00, 31 January 2012. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

In computer security, a Network Intrusion Detection System (NIDS) is an intrusion detection system that attempts to discover unauthorized access to a computer network by analyzing traffic on the network for signs of malicious activity.[1]

A NIDS reads all the incoming packets and tries to find suspicious patterns known as signatures or rules. If, for example, a large number of TCP connection requests to a very large number of different ports are observed, one could assume that there is someone conducting a port scan of some or all of the computer(s) in the network. It also (mostly) tries to detect incoming shellcodes in the same manner that an ordinary intrusion detection system does.[citation needed]

A NIDS is not limited to inspecting incoming network traffic only. Often valuable information about an ongoing intrusion can be learned from outgoing or local traffic as well. Some attacks might even be staged from the inside of the monitored network or network segment, and are therefore not regarded as incoming traffic at all.[citation needed]

Often network intrusion detection systems work with other systems as well. They can, for example, update some firewalls' blacklist with the IP addresses of computers used by (suspected) crackers[citation needed].

Certain DISA documentation, such as the Network STIG, uses the term NID to distinguish an internal IDS instance from its outward-facing counterpart. [citation needed]

See also

References

  1. ^ Ptacek, Thomas H. & Newsham, Timothy N. (January 1998); "Insertion, Evasion, and Denial of Service: Eluding Network Instrusion Detection"