Skip to main content

IPS (INTRUSION PREVENTIO SYSTEM)



WHAT IS INTRUDER

1. HE IS JUST A PERSON WHO IS TRYING TO GAIN UNAUTHORISED ACCESS TO A SYSTEM ON NETWORK WITH CRIMINAL INTENTION. 

IT CAN COMPLETELY CONTROL AND TERMINATE AND CRUPTE THIS NETWORK.

TYPES OF INTRUDER

1. INSIDE INTRUDER 

2. OUTSIDE INTRUDER

OUTSIDE INTRUDER

HE IS ACTUALLY NOT HAVING AREA AUTHORISED ACCESS TO THE SYSTEM OR NETWORK.

 INSIDE INTRUDER

1. HE IS HAVING SOME AUTHORISED ACCESS TO THE SYSTEM OR NETWORK BUT IS SOME RESTRICTIONS. HE DO NOT USE IS FOR THE PURPOSE OF SYSTEM.

2. INSIDE INTUDOR IS HARMFUL THAN THE OUTSIDE INTRUDER BECAUSE VERY DIFFICULT TO IDENTIFY HIS.

WHAT IS IPS

1. IN SHORT, AN INTRUSION PREVENTION SYSTEM (IPS), ALSO KNOWN AS INTRUSION DETECTION PREVENTION SYSTEM (IDPS), 

2. IPS IS A NETWORK SECURITY TOOL WHICH CAN BE HARDWARE OR SOFTWARE THAT CONTINUOUSLY MONITORS ARE NETWORK FOR MALICIOUS ACTIVITY AND TAKES ACTION TO PREVENT IT.

IT INCLUDING REPORTING BLOCKING OR DROPPING IT.  WHEN IT DOES OCCUR.

___________

WHO IS WORK IPS

1. HOW AN IPS WORKS. AN INTRUSION PREVENTION SYSTEM WORKS BY ACTIVELY SCANNING FORWARDED NETWORK TRAFFIC FOR MALICIOUS ACTIVITIES AND KNOWN ATTACK PATTERNS. 

2. THE IPS ENGINE ANALYZES NETWORK TRAFFIC AND CONTINUOUSLY COMPARES THE BITSTREAM WITH ITS INTERNAL SIGNATURE DATABASE FOR KNOWN ATTACK PATTERNS.

___________

FIGURE OF IPS

TYPES OF IPS 

1.  (NIPS) NETWORK-BASED INTRUSION PREVENTION SYSTEM . A NIPS MONITORS AND PROTECTS AN ENTIRE NETWORK FROM ANOMALOUS OR SUSPICIOUS BEHAVIOR.

2.  (WIPS) WIRELESS INTRUSION PREVENTION SYSTEM.

 3.  (HIPS) HOST-BASED INTRUSION PREVENTION SYSTEM.

__________

IP IPS STANDS FOR INTRUSION PREVENTION SYSTEM (IPS). IT IS A NETWORK SECURITY DEVICE THAT MONITORS NETWORK TRAFFIC FOR MALICIOUS ACTIVITY AND TAKES ACTION TO BLOCK OR PREVENT IT.

IPS CAN BE USED TO PROTECT AGAINST A WIDE RANGE OF THREATS, INCLUDING:

VIRUSES

WORMS

TROJANS

SPYWARE

DENIAL-OF-SERVICE ATTACKS

PORT SCANS

ZERO-DAY ATTACKS

IPS WORKS BY INSPECTING NETWORK TRAFFIC FOR PATTERNS THAT MATCH KNOWN ATTACK SIGNATURES. IF A MATCH IS FOUND, THE IPS CAN TAKE ACTION TO BLOCK OR PREVENT THE ATTACK,

SUCH AS:

DROPPING THE PACKET

LOGGING THE PACKET

SENDING AN ALERT

TAKING CONTROL OF THE INFECTED SYSTEM.

IPS CAN BE DEPLOYED IN A VARIETY OF WAYS, INCLUDING:

AS A STANDALONE DEVICE

AS A MODULE IN A FIREWALL OR ROUTER

AS A VIRTUAL APPLIANCE

IPS IS AN IMPORTANT PART OF A COMPREHENSIVE NETWORK SECURITY STRATEGY. BY DETECTING AND PREVENTING MALICIOUS ACTIVITY, IPS CAN HELP TO PROTECT NETWORKS FROM A WIDE RANGE OF THREATS.

HERE ARE SOME OF THE BENEFITS OF USING AN IP IPS:

IT CAN HELP TO PREVENT CYBERATTACKS.

IT CAN HELP TO IDENTIFY AND RESPOND TO SECURITY THREATS.

IT CAN HELP TO IMPROVE NETWORK PERFORMANCE.

IT CAN HELP TO REDUCE THE RISK OF DATA BREACHES.

____________

DIFFREENCE BETWEEN IDS AND IPS




 




Comments

Popular posts from this blog

TCP/IP MODEL

  HISTORY OF TCP/IP MODEL THE TCP/IP MODEL WAS DEVELOPED BY VINT CERF AND BOB KAHN IN THE 1970S. THEY WERE BOTH WORKING AT THE DEFENSE ADVANCED RESEARCH PROJECTS AGENCY (DARPA) AT THE TIME. Vint Cerf And Bob Kahn CERF AND KAHN WERE TASKED WITH DEVELOPING A NEW NETWORK PROTOCOL THAT WOULD BE MORE RELIABLE AND EFFICIENT THAN THE EXISTING PROTOCOLS. THEY CAME UP WITH THE IDEA OF USING A LAYERED APPROACH, WHICH WOULD ALLOW EACH LAYER TO FOCUS ON A SPECIFIC TASK. THIS LED TO THE DEVELOPMENT OF THE TCP/IP MODEL, WHICH IS STILL THE BASIS FOR HOW DATA IS TRANSMITTED OVER THE INTERNET TODAY. CERF AND KAHN ARE OFTEN REFERRED TO AS THE "FATHERS OF THE INTERNET" FOR THEIR WORK ON THE TCP/IP MODEL. THEY WERE INDUCTED INTO THE NATIONAL INVENTORS HALL OF FAME IN 2004 FOR THEIR CONTRIBUTIONS TO THE DEVELOPMENT OF THE INTERNET. HERE ARE SOME OTHER NOTABLE PEOPLE WHO CONTRIBUTED TO THE DEVELOPMENT OF THE TCP/IP MODEL: JON POSTEL: POSTEL WAS THE FIRST CHAIRMAN OF THE INTERNET ENGINEERI...

About Me Information

HELLO FRIENDS, I HOPE YOU ALL ARE DOING WELL. I AM MAKING THIS BLOG FOR THE INFORMATION OF NETWORKING ABOUT. IN THIS BLOG WE WILL READ CCNA (200-301) AND ITS RELATED AND NETWORK RELATED INFORMATION. MY NAME IS ABDUL MANAN JAVED MANJ MY AGE IS 21 YEAR    I AM STUDED ABOUT NETWORK  TECHNOLOGY EMAIL ID : mananrajpoot449@gmail.com CONTACT NO : +923486777628 ADDRESS : ISLAMABAD,G7,KHADA MARKET My Website   My Facebook Account My Facebook Page My Linkedin Profile _____________________________ CONTENT ABOUT  HIS BLOGG 1.  Computer Network 2.   What Is Internet 3.   Network Architecture 4.  Osi Refrence Model 5.  Operating System 6.  Internet Protocol (Ip) 7.  Internet Protocol Types 8.   Port Number 9.  Mac-Address 10.    WHAT IS HUB 11.   WHAT IS SWITCH 12.   WHAT IS ROUTER 13.   WHAT IS NETWORK 14.   NETWORK CABLES 15.   ROUTING 16.  Data Transmission 17...

Internet Protocol (IP) Address

  IP ADDRESS IT IS A UNIQUE ADDRESS THAT WE CAN ASSIGN TO DEVICE .SO THAT DEVICECAN COMMUNICATE WITH EACH OTHER. WE CANNAOT ASSIGN SAME IP ADDRESS IN ANY TWO DEVICES IN OUR NETWORK. IF WE WILL DO THIS THEN IT WILL BE  CAUSE A CONFLICT ERROR. TWO VERSION OF IP ADDRESS: 1: IPV4 ; 2: IPV6 ; IPV4 32 BITS AND IPV6 128 BITS. AN IP ADDRESS, OR INTERNET PROTOCOL ADDRESS, IS A SERIES OF NUMBERS THAT IDENTIFIES ANY DEVICE ON A NETWORK.  COMPUTERS USE IP ADDRESSES TO COMMUNICATE WITH EACH OTHER BOTH OVER THE INTERNET AS WELL AS ON OTHER NETWORKS. TO FIND THE IP ADDRESS CLASS WE NEED TO LOOK AT THE FIRST DIGIT OF THE IP ADDRESS. AND BY LOOKING AT THE FIRST DIGIT, WE CAN GUESS THE SUBNET MASK TO WHICH CLASS IT BELONGS. CLASS A IP ADDRESS SUBNET MASK 255.0.0.0 CLASS B IP ADDRESS SUBNET MASK  255.255.0.0  CLASS C IP ADDRESS SUBNET MASK 255.255.255.0 IANA TABLE IP RANGES                 IANA   ( Internet Assigned Numbers Au...