U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

intrusion detection system (IDS)

Definition(s):

  IDSs which detect attacks by capturing and analyzing network packets. Listening on a network segment or switch, one network-based IDS can monitor the network traffic affecting multiple hosts that are connected to the network segment.
Source(s):
CNSSI 4009-2015 under intrusion detection systems (IDS), (network-based) from NIST SP 800-36

  Software that automates the intrusion detection process.
Source(s):
CNSSI 4009-2015 from NIST SP 800-94
NIST SP 800-12 Rev. 1 under Intrusion Detection System (IDS) from NIST SP 800-94

  A security service that monitors and analyzes network or system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner.
Source(s):
NIST SP 800-82 Rev. 2 under Intrusion Detection System (IDS) from RFC 4949

  A software application that can be implemented on host operating systems or as network devices to monitor activity that is associated with intrusions or insider misuse, or both.
Source(s):
NIST SP 800-47 [Superseded] under Intrusion Detection System (IDS)

  IDSs which operate on information collected from within an individual computer system. This vantage point allows host-based IDSs to determine exactly which processes and user accounts are involved in a particular attack on the Operating System. Furthermore, unlike network-based IDSs, host- based IDSs can more readily “see” the intended outcome of an attempted attack, because they can directly access and monitor the data files and system processes usually targeted by attacks.
Source(s):
CNSSI 4009-2015 under intrusion detection system (IDS), (host-based) from NIST SP 800-36

  Software that looks for suspicious activity and alerts administrators.
Source(s):
NISTIR 7711 under Intrusion Detection System