Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Intrusion Detection System (IDS)

Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution
A technology used to detect both pre-mortem and or post-mortem security threats.
Published in Chapter:
Optimized Three-Dimensional Security Framework to Mitigate Risks Arising From BYOD-Enabled Business Environment
Lizzy Oluwatoyin Ofusori (University of KwaZulu-Natal, South Africa), Ncamiso Nkululeko Jahalenkhosi Dlamini (University of KwaZulu-Natal, South Africa), and Prabhakar Rontala Subramaniam (University of KwaZulu-Natal, South Africa)
DOI: 10.4018/978-1-5225-4763-1.ch008
Abstract
Bring your own device (BYOD) has infiltrated the work environment and businesses are enjoying the benefits coupled with the adoption of the trend. At the same time, the adoption of BYOD has introduced a number of security threats that businesses are failing to match. In the pursuit of addressing security threats that are introduced by the adoption of this technology trend, this chapter recommends a three-dimensional (3-D) security framework that can be used to mitigate the risks emanating from a BYOD enabled environment. Data was collected from the employees of two banks in Africa that supported BYOD trend to measure individual and organizational practices. This chapter investigates further on these practices in addressing implications of BYOD. Three categories of security threats are delineated in this chapter. A review of existing security frameworks is presented in this chapter. The chapter concludes by outlining a 3-D security framework as a potential solution to protect BYOD enabled business environment.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Online Social Networks Misuse, Cyber Crimes, and Counter Mechanisms
It is a type of security software system that monitors network traffic and alerts the administrators for any suspicious, malicious activities or security policy violations.
Full Text Chapter Download: US $37.50 Add to Cart
Artificial Intelligence-Based Solutions for Cyber Security Problems
The intrusion detection system (IDS) is used to detect malicious activity or links in network traffic. monitors all inbound and outbound network activity and identifies suspicious patterns that could indicate a network or system attack from someone trying to break into or hijack a system.
Full Text Chapter Download: US $37.50 Add to Cart
A Novel Application of the P2P Technology for Intrusion Detection
Examines the contents of the packets allowed through the firewall. It monitors network traffic to look for known signature attack patterns. When the malicious traffic is observed, the IDS generates an alert.
Full Text Chapter Download: US $37.50 Add to Cart
A Survey of Security and Privacy Protection in Mobile Devices
A system that detects intrusion on a device through several methods including malware signature, system anomalies, and heuristic scanning.
Full Text Chapter Download: US $37.50 Add to Cart
IDS and IPS Systems in Wireless Communication Scenarios
Hardware and/or software with certain intelligence monitoring able to analyze automatic events that happen in a computing system or network. The system’s main objective is to identify possible threats and to carry out response actions.
Full Text Chapter Download: US $37.50 Add to Cart
Software-Defined Network Security
A network security middle-box that is either signature- or anomaly-based.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy Issues in the Internet of Things
IDS generates alerts if there are any suspicious activity being carried out by continuously monitoring the system.
Full Text Chapter Download: US $37.50 Add to Cart
The Detection of SQL Injection on Blockchain-Based Database
It is a software application to monitor unwanted and malicious activity on the network.
Full Text Chapter Download: US $37.50 Add to Cart
Neural Networks for Intrusion Detection
An IDS is a security system that monitors computer systems and network traffic. It analyzes the traffic for possible hostile attacks originating from outside the organization as well as for system misuse, and attacks originating from inside the organization.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Peer-to-Peer Methods for Operating System Security
It can examine the contents of the packets allowed through the firewall. It monitors network traffic to look for known signature attack patterns. When malicious traffic is observed, the IDS generates an alert.
Full Text Chapter Download: US $37.50 Add to Cart
Security of In-Vehicle Communication Systems: A Survey of Possible Vulnerabilities
A system that detects intrusions in a network by inspecting the traffic, trying to identify malicious packets.
Full Text Chapter Download: US $37.50 Add to Cart
Real Time Internal Intrusion Detection: A Case Study of Embedded Sensors and Detectors in E-Government Websites
A device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.
Full Text Chapter Download: US $37.50 Add to Cart
Automated Detection of SQL Injection Attack on Blockchain-Based Database
It is a software application to monitor the unwanted and malicious activity on the network.
Full Text Chapter Download: US $37.50 Add to Cart
Honeypots and Honeynets: Analysis and Case Study
Piece of software used for non-authorized access detection on computers or networks. These systems usually have virtual sensors (such as network sniffers) that help obtaining external data (normally about network traffic) and thus detecting anomalies arising from attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Computing: A Security and Defense Proposal
A monitoring system that detects suspicious activities and generates alerts when they are detected.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Ad Hoc Network Security Vulnerabilities
Is used to detect many types of malicious network traffic and computer usage that can’t be detected by a conventional firewall.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Security: Challenges, Solutions, and Future Directions: Navigating the Complexities of securing Cloud
A system that monitors networks for malicious activities or policy violations, reporting any detected issues for further action.
Full Text Chapter Download: US $37.50 Add to Cart
Using Deep Learning and Big Data Analytics for Managing Cyber-Attacks
When a probable intrusion occurs, a mix of software and hardware, known as IDS, attempts to detect it and raises an alarm.
Full Text Chapter Download: US $37.50 Add to Cart
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
An automated system used to warn operators of intrusions or intrusion attempts. An IDS is implemented in software and/or hardware.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR