The lowdown on intrusion-detection

Related Links

Stemming the tide

What is it? Intrusion-detection software is designed to monitor networks in order to detect incoming probes and attacks, and either alert a system administrator or automatically respond'or both.

What's new? New intrusion-detection systems, using pattern recognition and other artificial-intelligence software, now monitor the network packets themselves. They watch for signs of an incoming attack and alert administrators before there's a breach. Some organizations are pairing intrusion-detection software with external network monitoring services, which can more quickly detect a denial-of-service attack.

Must-know info: With the variety of potential attacks expanding'including distributed denial-of-service attacks and Domain Name System cache poisoning'that don't depend on gaining entry to a network, enterprises need to extend the perimeter of their defenses. Use tools such as remote site monitoring and response measurement, network monitoring, and automated network management that take advantage of programmed policies and pattern recognition to launch a response to a developing threat before it takes a network or Web site offline.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above