Professional Documents
Culture Documents
Seminar Ids
Seminar Ids
CONTENTS
1. Intrusion and Intrusion Detection
2. Different ways to Intrude a Network
3. What is IDS?
4. Example of IPS in a Company
5. Classification of Intrusion Detection System
6. Detection Methods of IDS
7. Advantages of IDS
8. Disadvantage of IDS
9. Future of IDS
Intrusion and Intrusion
Detection
• Intrusion : Attempting to break into or misuse
your system.
• Defense.
Advantages An IDS adds a layer of defense to your security profile, providing a useful
backstop to some of your other security measures.
IDS When a virus first hits your network, an IDS can tell you which machines it
compromised, as well as how it is propagating through the network to infect
other machines.
• Evidence.
A properly configured IDS can produce data that can form the basis for a civil
or criminal case against someone who misuses your network.
• More maintenance.
When you install it, it will require additional maintenance effort and will not
remove much, if any, of the existing virus.
• False positives.
Disadvantages IDSs are famous for setting off false positives-sounding the alarm when
nothing is wrong.
Of • False negatives.
IDS IDSs can also miss intrusions. Technologies are improving, but IDSs don't
always catch everything.
• Staff requirements.
Properly managing an IDS requires experienced staff. The less experienced
your staff are, the more time they will spend responding to false positives.
Future of IDS
• Introducing cloud-centric product
development
• Shift from product- to service-
focused models
• Growing connectivity
• Wireless, two-way communication
THANK YOU!!
Presented By -
Name: Udisha Mandal
Section: CS3E
Roll No:76
Enrollment No:12018009019108