Intrusion detection systems is program designed for detection and identifying of malicious activity on a host or malicious activities within a computer network. Network-based intrusion detection systems check for live data, host-based intrusion detection systems examine the log files on the system.
Types Of Intrusion Detection Systems:
1. Host Intrusion Detection Systems (HIDS)
2. Network Intrusion Detection Systems (NIDS)
Both Network-based intrusion detection systems and host-based intrusion detection systems examine system records and activities. In Host-Based Intrusion Detection systems, most auditors usually look at log, event records and records in files. However, Network-based intrusion detection systems search for and examines packet data communicated within a networks.
Both HIDS and NIDS implementation is necessary for a network. It is advisable to implement HIDS before NIDS because each and every computers must be examined before moving further on examining the network in which computers are connected.