Chapter 10. Intrusion Detection System Concepts

On completing this chapter, you will be able to

  • Explain the main differences between the various IDSs

  • Describe host-based IDSs in detail

  • Describe network-based IDSs in detail

  • Explain how IDS management communication works

  • Describe IDS tuning

  • Explain how IDS maintenance works

This chapter builds on the introductory discussions of intrusion detection systems (IDSs) presented in Chapter 3, “Understanding Defenses.” This chapter delves into IDS concepts, uses, applications, and limitations. After the introduction to IDSs, their deployment and analysis are discussed in more detail. The concluding case study is a practical example of how organizations can inspect and monitor overall network activity using IDSs ...

Get Network Security Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.