IDS
(Intrusion Detection
Systems) allow monitoring
the network traffic,
to determine the type
of traffic and the various
ports which are being
monitored. Proper planning
is important in deployment
of IDS. It is important
to have implementation
plan in place to detect
intrusion in the case
system is compromised.
IDS simply monitor the
traffic which has already
made roads into the network.
It means, the network is
already compromised or
the attack originates inside
your network boundaries.
|