Table of contents
1.
Introduction
2.
Intrusion Detection System (IDS)
3.
Working Of IDS
4.
Types of Intrusion Detection Systems
4.1.
Host-Based Intrusion Detection System(HIDS)
4.2.
Network-Based Intrusion Detection System(NIDS)
4.3.
Protocol-based Intrusion Detection System(PIDS)
4.4.
Application Protocol-based Intrusion Detection System(APIDS)
4.5.
Hybrid Intrusion Detection System
5.
Comparison of IDS with Firewalls
6.
Examples of IDS
7.
FAQs
8.
Key Takeaways
Last Updated: Mar 27, 2024
Easy

What is IDS

Author Apoorv Dixit
1 upvote
Career growth poll
Do you think IIT Guwahati certified course can help you in your career?

Introduction

In a network security class:

Teacher:  “Do you know who are intruders?”

Student: “Intruders are the attackers who are trying to get unauthorized access.”

Teacher: “How and why do they do that?”

Student: “They try various attacks, malware, to intrude our system for stealing our personal information.”

 

Teacher: “And how will you protect your system or network?”

Student: “...............(keeps on thinking, worrying about the security of his system at the same time😅)..............”

 

Teacher: “Well, IDS is there for help, to protect intrusions and unauthorized access.”

The above convo explains why IDS is important. IDS or Intrusion Detection System is software to protect your system or network from unauthorized access. It identifies suspicious and malicious activity through network traffic. In this article, we will discuss IDS, its working, importance, and classification. In the end, we will also see how IDS are different from firewalls.

Intrusion Detection System (IDS)

An Intrusion Detection System (IDS) is a software application that monitors network traffic for suspicious activity and issues an alert when such activity is discovered. In today's time, it is possible for hackers to breach the system, and IDS is more needed than ever. IDS continuously scans a network or system for malicious activity and monitors for breaches. If any malicious activity or violation occurs, it alarms the administrator or passes the reported information to the SIEM(Security information and event management) system. A SIEM system integrates these reports from multiple sources and differentiates malicious activity from false alarms by using alarm filtering.

A diagram showing IDS architecture is given below.

                          
                                                                                       Source: researchgate


Intrusion is mainly of two types:

  1. From Outside the network or system, here intruders are called Masqueraders.
  2. From Inside the network or system, here intruders are called Misfeasor, and they already have some privileges and try to gain some unauthorized access.
     


 Source: itsecurityguru

Now let's understand the working of IDS and its classifications by which it protects us from inside and outside attacks.

Working Of IDS

IDS first works on data collection and analyzing patterns. After data collection, IDS observes network traffic and matches the traffic patterns to known attacks. Once suspicious activity is detected, IDS sends an alarm to the administrator. IDS alarm helps the user/system troubleshoot the root sources of the issue. 


Source: tenor

Intrusion Detection System uses two main intrusion detection methods:

  1. Signature-based intrusion detection
  2. Anomaly-based intrusion detection

 

Note: To learn about the detection method of IDS, you can refer to IDS Detection Methods.

Types of Intrusion Detection Systems

Intrusion detection systems are of the following types:

Host-Based Intrusion Detection System(HIDS)

Host-Based Intrusion Detection System or Host Intrusion Detection System runs on independent hosts or devices of the network. It examines events on a computer on the host computer rather than the traffic that passes around the system. It works by looking at data present in admin files on the computer. Admin files include log files and config files.  

HIDS will back up all the configuration files so that settings can be restored in case some malicious program alters them. To monitor these changes, HIDS takes a screenshot of admin files from time to time and compares these changes. If the admin files were edited, deleted, or altered, an alert is sent to the administrator. Later these changes can be restored with the help of the previous screenshots. However, it won't block these changes; it only helps to alter if any unauthorized access occurs.

Network-Based Intrusion Detection System(NIDS)

Network-Based Intrusion Detection System or Network Intrusion Detection System helps to examine traffic on your network from all devices on the network. Once any malicious activity is detected, an alert is sent to the administrator. To detect this traffic and analyze a network, NIDS includes a packet sniffer. NIDS performs an overall observation of passing traffic on the entire subnet once an abnormal behavior is detected, the alert is raised. An example of NIDS is installing it on a subnet where the firewall is present, to detect breaches in the firewall.

Protocol-based Intrusion Detection System(PIDS)

Protocol-based IDS consists of a system or agent that consistently resides on a web server, controlling and interpreting the protocols between device and server. A typical use of PIDS would be at the front end of the web server monitoring the protocols like HTTP or HTTPS stream. It can offer great protection because it understands HTTP and HTTPS relative to a web server. Similarly, a PIDS can be used to monitor many other protocols used by the computing system.

Application Protocol-based Intrusion Detection System(APIDS)

An Application Protocol-based Intrusion Detection System, also known as APIDS, is an intrusion detection system that monitors and analyzes a specific application protocol or protocols used by the computing system. It generally resides within a group of servers and identifies intrusions by monitoring and interpreting the communication on application-specific protocols. For example, it will monitor database protocols explicit to the middleware as it interacts with the database in the webserver.  

Hybrid Intrusion Detection System

As the name suggests, a Hybrid intrusion detection system is made by combining two or more types of intrusion detection systems. In the hybrid approach, host agent or system data is combined with information to develop a complete network view. These systems are generally more effective than other intrusion detection systems.

Comparison of IDS with Firewalls

IDS and firewall both are related to network security, they protect your system from unauthorized access. The difference between firewalls and IDS lies in the scope of protection they are providing. The firewall protects the network from outside attacks, i.e., it looks for outward intrusions in order to stop them. It restricts access between networks to prevent intrusion. But if there is an attacker who is trying to breach the system from inside or any other inside intrusion, then the firewall won't signal. IDS looks for any suspected intrusion(both inside and outside the network), and once it happens, it will signal an alarm.
 

Examples of IDS

In today's time, various Intrusion Detection And Prevention Systems are widely used; since they are both 'detection and prevention' sytems, they are collectively termed as IDPS. Some examples of IDS are:

  1. SolarWinds Security Event Manager (SEM)
  2. McAfee
  3. Suricata
  4. Zeek
  5. Blumira

FAQs

  1. Why is an Intrusion Detection System needed? 
    An intrusion detection system is needed because it enables users to detect and respond to malicious traffic, thus protecting them from Cyberattacks. It helps users to protect his system from outside and inside attacks.
     
  2. Who is Misfeasor?
    Misfeasor is a legitimate user who accesses or tries to access unauthorized data, programs, or resources. He is authorized for such access in some cases but misuses his privileges.
     
  3. What is a firewall?
    A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on a set of protocols.
     
  4. What is an intrusion?
    Intrusion can be defined as a breach in a network. It's unauthorized access by the attacker who doesn't have legitimate permission to access the network or system.
     
  5. What is a packet sniffer?
    A packet sniffer is hardware or software used to monitor network traffic. Sniffers work by examining streams of data packets that flow between computers on a network as well as between networked computers.

Key Takeaways

In this article, we have extensively discussed Intrusion Detection System, its classification, and its working. We also compared IDS with a Firewall. After all this discussion, we can say that IDS is the need of modern time that can ensure the protection of system or network from inside and outside intrusions.

We hope that this blog has helped you enhance your knowledge regarding Cyber Security and Intrusion Detection System, and if you would like to learn more, check out our articles, Cyber Security PrincipleWhat is Cryptography, and Cyber attacks and their Types. Do upvote our blog to help other ninjas grow.

Happy Learning!

Live masterclass