Intrusion prevention

Intrusion prevention, at its most basic, requires some way of recognizing intrusions in real time, of being able to handle both known and unknown types of attacks, and then having a way of blocking the incursions. This can happen in two ways:

* Network-based intrusion prevention puts a device directly on the network in a critical data path that inspects all the traffic allowed through by the firewall, which is the first line of perimeter defense. Those prevention products use various methods to spot trouble, such as looking for the characteristic signatures of known viruses or comparing the current traffic to a baseline of normal traffic behavior. If the devices detect anomalies, they block the traffic from continuing onto the network.

* Host-based intrusion prevention places intelligent agents on each host computer or server to flag intrusions by comparing the behavior of systems against

expected norms. If deviations occur, the systems then have some way of blocking the procedures that are causing the anomalous behavior without affecting the machine's normal operations.

About the Author

Brian Robinson is a freelance writer based in Portland, Ore.

Featured

  • FCW Perspectives
    remote workers (elenabsl/Shutterstock.com)

    Post-pandemic IT leadership

    The rush to maximum telework did more than showcase the importance of IT -- it also forced them to rethink their own operations.

  • Management
    shutterstock image By enzozo; photo ID: 319763930

    Where does the TMF Board go from here?

    With a $1 billion cash infusion, relaxed repayment guidelines and a surge in proposals from federal agencies, questions have been raised about whether the board overseeing the Technology Modernization Fund has been scaled to cope with its newfound popularity.

Stay Connected