IPS and IDS | Attack detection and prevention systems
Channel | Publish Date | Thumbnail & View Count | Download Video |
---|---|---|---|
Publish Date not found | 0 Views |
In this video we discuss intrusion detection and intrusion prevention systems.
The Intrusion Detection Systems (IDS) receive a copy of the packets traveling through the network. Then the IDS compares these packets with some predefined signature files that contain patterns of potential threats. If the pattern is matched, an alert message can be sent to the network administrator.
Intrusion Prevention Systems (IPS) not only detect threats but also take action when they detect a match between the packets transmitted through the network and the signature files installed in them. IPS are used in data traffic.
The Intrusion Detection Systems (IDS) receive a copy of the packets traveling through the network. Then the IDS compares these packets with some predefined signature files that contain patterns of potential threats. If the pattern is matched, an alert message can be sent to the network administrator.
Intrusion Prevention Systems (IPS) not only detect threats but also take action when they detect a match between the packets transmitted through the network and the signature files installed in them. IPS are used in data traffic.
#IPS
#IDS
#Intrusion detection system
#IntrusionPreventionSystems
Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.