Companies Using IDS To Secure Their Networks

1672 Words4 Pages

Organizations are more concerned about computer security, as most information now is stored in databases, and most systems are connected to the Internet. Use of Intrusion Detection Systems (IDS) is one of the factors companies should consider when planning their information security policy. IDS is important to protect sensitive information, to meet laws and regulations and to prevent economic loss, although in some cases IDS implementation is no economically viable. To be able to determine if an implementation of an IDS is necessary some factors must be taken into consideration, such as advantages and disadvantages, economy, laws and regulations.

The basics of Intrusion Detection (IDS) and Intrusion Prevention (IPS) systems are essential to determine. A definition of an IDS is “the tools, methods, and resources to help identify, assess and report unauthorized or unapproved network activity” (Endorf, Schultz and Mellander, 2004, p. 4). There are three types of IDS, each of which functions differently, namely host-based IDS (HIDS), network-based IDS (NIDS) and hybrids. HIDS is software that scans all resources on a host for activity, and then compares against known threats. NIDS analyzes network packets on a network segment and either compare against known threats or analyze for patterns of malicious behaviour. A hybrid IDS combines these two methods (Endorf, Schultz and Mellander, 2004, p. 7). Two different analysis methods are used; rule-based detection analyses based on signatures, like virus scanning, and profile-based detection looks for abnormal data patterns (Endorf, Schultz and Mellander, 2004, pp. 16-17). Larger companies with sensitive information to protect should use hybrids to protect the network and those servers containing sensitive information. Ortega (2006, p. 6) states that signature-based solutions will not work for defending sensitive information, because hackers knows how to conduct new types of attacks.

Furthermore, according to Grimes (2004, p. 301) there are two generations of IDS. First-generation is based on accurate detection to give early warnings to security managers. Second-generation IDS uses more features to improve the accuracy and decrease the cost, and also implement some prevention mechanisms. Second generation gives the most protection, but for small organisations first generation will be sufficient and easier to implement and maintain.

Another consideration is a good management system. Grimes (2004, p. 317) says that instead of many management systems it is better to implement one system that can manage all security products in an effective way. Systems combining IDS and firewall technology should also be considered, especially for smaller organisations that have to save costs and manpower (Grimes.

More about Companies Using IDS To Secure Their Networks

Open Document