What is Intrusion?

July 25, 2019

Please reload

Recent Posts

I'm busy working on my blog posts. Watch this space!

Please reload

Featured Posts

What is Intrusion?

 Let's Get Technical

 

An intrusion is any activity that is designed to compromise your data security. This can be through more menacing and pervasive formats like ransomware or unintentional data breaches by employees or others connected to your network. An intrusion may include any of the following:

 

 

 

 

 

  • Malware or ransomware

  • Attempts to gain unauthorized access to a system

  • DDOS attacks

  • Cyber-enabled equipment destruction

  • Accidental employee security breaches (like moving a secure file into a shared folder)

  • Untrustworthy users –– both team members and those outside of your organization

  • Social engineering attacks –– such as phishing campaigns and other ways of tricking users with seemingly legitimate communication

 

There are hundreds of ways that you can experience data insecurity through an intrusion. There are much fewer methods for ensuring data safety with confidence and dependability. One trusted data security solution is using an intrusion detection system.

 

What is an intrusion detection system?

 

Imagine you’re a security expert tasked with monitoring public safety for a metropolitan city’s large event. You can accomplish this in several different ways. You would likely have an aerial view and officers scattered throughout the event, scanning nearby groups, and assessing each person’s level of threat from close up. You would be wise to hire security experts who know what to look for based on their experience with known attackers who can flag behavior others may not notice.

 

This is, essentially, what your intrusion detection system (IDS) does day after day with your data packets, monitoring traffic to keep your network safe and secure from threats. 

These are the three main types of intrusion detection systems:

 

  • A network intrusion detection system (NIDS) is a security expert who has seen it all. It compares the data on your network to known attacks on an entire subnet and flags any suspicious traffic.

  • A network node intrusion detection system (NNIDS) works similarly to the NIDS, except on a micro level. It checks each node connected to the network for threats and malicious activity. NNIDS is the security guard checking bags of each person walking into the event. 

  • A host intrusion detection system (HIDS) is the eye in the sky, checking on the whole event. A HIDS examines all of the system’s nodes and hosts to gather a more complete picture and then runs security checks for malicious activity based on that entire picture. Some security experts suggest that this type of IDS is the most effective as it can detect threats that originate within the network as well as external threats.

 

Firewall security versus intrusion detection techniques

 

Your business needs a firewall, a barricade keeping blatant malicious activity from entering your network. Of course, network attacks are becoming more sophisticated and occasionally occur from within your network, and that requires a higher level of scrutiny for each data packet traversing your network. Within intrusion detection systems there are two intrusion detection techniques: either noting suspicious activity or requiring strict security clearance for network entrance.

 

Here are the two intrusion detection techniques explained:

 

  • Signature-based intrusion detection: As long as your network has a reliable database of stored signatures, checking packets against signatures (known identity) will keep your network safe. On the downside, signature-based IDS will cost your clients in CPU when using advanced signatures, which are better because they’re harder to falsify.

  • Anomaly-based intrusion detection: One of the most important benefits of an anomaly-based IDS is its ability to detect the precursors to attacks: sweeps and probes toward network hardware. It also looks for anything out of the ordinary, within the network and from outside of it. The cons of an anomaly-based IDS are the cost of setup and requirement of connection to a security operation center. Because it is more comprehensive, it requires a bit more involvement. It is also arguably more effective than a signature-based IDS.

Intrusion detection vs. intrusion prevention

 

An IDS is the first line of defense –– detecting threats. Now, it’s time to bring in the S.W.A.T. team and neutralize the threat. Intrusion prevention systems are typically paired with an intrusion detection system to create the ultimate tool in threat detection and prevention. An intrusion detection and prevention system, like the one our partners use - Datto Networking Appliance (DNA), detects threats and uses deep packet inspection features to detect and prevent intrusions in your and your clients’ networks.

 

With growing threats and more entry points than ever, your company's network security features need to be robust and proactive.

 

Learn how to bolster your network security offering with Data Safe's security toolkit, Ransomware Made MSPeasy. www.datasafellc.com

Share on Facebook
Share on Twitter
Please reload

Follow Us