U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

intrusion detection system (IDS)

Definition(s):

  IDSs which detect attacks by capturing and analyzing network packets. Listening on a network segment or switch, one network-based IDS can monitor the network traffic affecting multiple hosts that are connected to the network segment.
Source(s):
CNSSI 4009-2015 under intrusion detection systems (IDS), (network-based) from NIST SP 800-36

  Software that automates the intrusion detection process.
Source(s):
CNSSI 4009-2015 from NIST SP 800-94
NIST SP 800-12 Rev. 1 under Intrusion Detection System (IDS) from NIST SP 800-94

  A security service that monitors and analyzes network or system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner.
Source(s):
NIST SP 800-82 Rev. 2 under Intrusion Detection System (IDS) from RFC 4949

  IDSs which operate on information collected from within an individual computer system. This vantage point allows host-based IDSs to determine exactly which processes and user accounts are involved in a particular attack on the Operating System. Furthermore, unlike network-based IDSs, host- based IDSs can more readily “see” the intended outcome of an attempted attack, because they can directly access and monitor the data files and system processes usually targeted by attacks.
Source(s):
CNSSI 4009-2015 under intrusion detection system (IDS), (host-based) from NIST SP 800-36

  Software that looks for suspicious activity and alerts administrators.
Source(s):
NISTIR 7711 under Intrusion Detection System

  A software application that can be implemented on host operating systems or as network devices to monitor activity that is associated with intrusions or insider misuse, or both.
Source(s):
NIST SP 800-47 [Superseded] under Intrusion Detection System (IDS)