INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
A
Seminar
Report On
Intrusion Detection System
BY MOHAMMED AHMED
WERABE, Ethiopia (Sep, 2024)
Contents
1. INTRODUCTION TO IDS..............................................................................................3
3. How Does an Intrusion Detection System Work? What Are Its Uses?...........................5
5. Advantages.......................................................................................................................6
6. Disadvantages...................................................................................................................7
7. Area of Application..........................................................................................................7
8. Conclusion......................................................................................................................7
9. References........................................................................................................................8
i
Figure 1: introduction to ids....................................................................................................4
Figure 2: area of application....................................................................................................8
ii
Seminar report
INTRODUCTION TO IDS
An Intrusion Detection System (IDS) is a security tool that monitors a computer network or
systems for malicious activities or policy violations. It helps detect unauthorized access,
potential threats, and abnormal activities by analysing traffic and alerting administrators to
take action. An ID is crucial for maintaining network security and protecting sensitive data
from cyber-attacks (1).
An Intrusion Detection System (IDS) maintains network traffic looks for unusual activity
and sends alerts when it occurs. The main duties of an Intrusion Detection System (IDS)
are anomaly detection and reporting, however, certain Intrusion Detection Systems can
take action when malicious activity or unusual traffic is discovered. In this article, we will
discuss every point about the Intrusion Detection System.
1
Intrusion Detection System
Seminar report
2
Intrusion Detection System
Seminar report
malicious actions to administrators so they can be examined at the application and protocol
layers. This enables organizations to detect the potential signs of an attack beginning or
being carried out by an attacker. IDS solutions do this through several capabilities,
including:
Monitoring the performance of key firewalls, files, routers, and servers to detect,
prevent, and recover from cyber attacks
Enabling system administrators to organize and understand their relevant
operating system audit trails and logs that are often difficult to manage and track
Providing an easy-to-use interface that allows staff who are not security experts
to help with the management of an organization’s systems
Providing an extensive database of attack signatures that can be used to match
and detect known threats
Providing a quick and effective reporting system when anomalous or malicious
activity occurs, which enables the threat to be passed up the stack
Generating alarms that notify the necessary individuals, such as system
administrators and security teams, when a breach occurs
In some cases, reacting to potentially malicious actors by blocking them and
their access to the server or network to prevent them from carrying out any
further action
The increasingly connected nature of business environments and infrastructures means they
demand highly secure systems and techniques to establish trusted lines of communication.
An ID has an important role within modern cyber security strategies to safeguard
organizations from hackers attempting to gain unauthorized access to networks and stealing
corporate data. (3)
3
Intrusion Detection System
Seminar report
4. Advantages
Early Threat Detection: IDS identifies potential threats early, allowing for quicker
response to prevent damage.
Enhanced Security: It adds an extra layer of security, complementing other cyber
security measures to provide comprehensive protection.
Network Monitoring: Continuously monitors network traffic for unusual activities,
ensuring constant vigilance.
Detailed Alerts: Provides detailed alerts and logs about suspicious activities,
helping IT teams investigate and respond effectively.
5. Disadvantages
False Alarms: IDS can generate false positives, alerting on harmless activities and
causing unnecessary concern.
Resource Intensive: It can use a lot of system resources, potentially slowing down
network performance.
Requires Maintenance: Regular updates and tuning are needed to keep the IDS
effective, which can be time-consuming.
Doesn’t Prevent Attacks: IDS detects and alerts but doesn’t stop attacks, so
additional measures are still needed.
Complex to Manage: Setting up and managing IDS can be complex and may
require specialized knowledge. (5)
4
Intrusion Detection System
Seminar report
6. Area of Application
7. Conclusion
Intrusion Detection System (IDS) is a powerful tool that can help businesses in detecting
and prevent unauthorized access to their network. By analysing network traffic patterns,
IDS can identify any suspicious activities and alert the system administrator. IDS can be a
valuable addition to any organization’s security infrastructure, providing insights and
improving network performance.
Reference
1. [Online] [Cited: 28 sep 2024.] https://www.geeksforgeeks.org/intrusion-detection-
system-ids/.
2. [Online] [Cited: 29 sep 2024.] https://www.geeksforgeeks.org/intrusion-detection-
system-ids/.
3.[Online][Cited: 29 sep 2024.] https://www.fortinet.com/resources/cyberglossary/intrusion-
detection-system.
4. [Online] [Cited: 29 Sep 2024.] https://www.helixstorm.com/blog/types-of-intrusion-
detection-systems/.
5. [Online] [Cited: 29 Sep 2024.] https://www.bootlabstech.com/ids-advantages-and-
disadvantages/.
5
Intrusion Detection System
Seminar report
6
Intrusion Detection System