Ids Idps Nids Hids
Ids Idps Nids Hids
Ids Idps Nids Hids
GROUP 6
GROUP 6 MEMBERS
TN TD TD
Nguyễn Thị Thủy Đỗ Anh Tài Đinh Công Thành
LN TN
Nguyễn Thị Mai Linh Ngô Quang Tùng
Main contents
GAM
IDS IDPS NIDS HIDS
E
Game
Game
1 2
3 4
Game
Question 1: What does IDS stand for?
Game
Question 1: What does IDS stand for?
INTRUSION
DETECTION SYSTEM
Game
Question 2: What does IDPS stand for?
Game
Question 2: What does IDPS stand for?
INTRUSION
DETECTION AND
PREVENTION
SYSTEM
Game
Question 3: What does NIDS stand for?
Game
Question 3: What does NIDS stand for?
NETWORK-BASED
INTRUSION
DETECTION
SYSTEM
Game
Question 4: What does HIDS stand for?
Game
Question 4: What does HIDS stand for?
HOST-BASED INTRUSION
DETECTION SYSTEM
IDS
Presenter: Nguyen Thi Mai Linh
IDS
- Components of IDS
• information collection
• Detection
• Response
IDS
- Function
• Monitors: Monitor network traffic for abnormal and suspicious activities.
• Signature-based detection
• Detection
• Prevention
• Response
• Auditing
The IDPS helps to ensure the security and integrity of the network and
protect it from various types of attacks.
IDPS
III. Types of IDPS
1. Network-based intrusion prevention system (NIPS):
· It is deployed within the wireless network and in areas that are susceptible
to unauthorized wireless networking.
IDPS
III. Types of IDPS
3. Network behavior analysis (NBA) system:
• Threshold monitoring
• Resource profiling measures how each system, host, and application consumes
and generates data. An application with a suddenly increased workflow might
indicate malicious behavior.
IDPS
V. Prevention–level functionalities of IDPS
2. Anomaly-based detection
• AirMagnet Enterprise
• Amazon Web Services (AWS) GuardDuty
• Azure Firewall Premium IDPS
• Blumira
• Cisco Secure IPS (NGIPS)
• Darktrace Enterprise Immune System
• IBM Intrusion Detection and Prevention System (IDPS) Management
• Meraki MX Advanced Security Edition
• NSFocus Next-Generation Intrusion Prevention System
• Snort
NIDS
Presenter: Ngo Quang Tung
NIDS
I. Definition.
2. Disadvantage of HIDS
IDS
incidents within the network system.
Defect:
• It needs to be configured properly, otherwise it
can cause false alarms.
• Relatively low ability to analyze encrypted
traffic.
• The development and operation costs of the
system are relatively high.
• IDPS is to provide information about threats,
vulnerabilities and intrusion behavior in the
system.
NIDS Disadvantage
• False positives
• Signature-based limitations
• High resource utilization
• Cost
• HIDS is an essential component of a
comprehensive security strategy to protect
computer systems from unauthorized access and
other security threats
• While HIDS has some limitations, it remains an
effective tool for detecting and responding to
HIDS
security breaches.