Chapter 10. Intrusion Detection System Concepts
On completing this chapter, you will be able to
- Explain the main differences between the various IDSs
- Describe host-based IDSs in detail
- Describe network-based IDSs in detail
- Explain how IDS management communication works
- Describe IDS tuning
- Explain how IDS maintenance works
This chapter builds on the introductory discussions of intrusion detection systems (IDSs) presented in Chapter 3, "Understanding Defenses." This chapter delves into IDS concepts, uses, applications, and limitations. After the introduction to IDSs, their deployment and analysis are discussed in more detail. The concluding case study is a practical example of how organizations can inspect and monitor overall network activity using IDSs to protect their assets.