The lowdown on intrusion-detection

Related Links

Stemming the tide

What is it? Intrusion-detection software is designed to monitor networks in order to detect incoming probes and attacks, and either alert a system administrator or automatically respond'or both.

What's new? New intrusion-detection systems, using pattern recognition and other artificial-intelligence software, now monitor the network packets themselves. They watch for signs of an incoming attack and alert administrators before there's a breach. Some organizations are pairing intrusion-detection software with external network monitoring services, which can more quickly detect a denial-of-service attack.

Must-know info: With the variety of potential attacks expanding'including distributed denial-of-service attacks and Domain Name System cache poisoning'that don't depend on gaining entry to a network, enterprises need to extend the perimeter of their defenses. Use tools such as remote site monitoring and response measurement, network monitoring, and automated network management that take advantage of programmed policies and pattern recognition to launch a response to a developing threat before it takes a network or Web site offline.

Featured

  • business meeting (Monkey Business Images/Shutterstock.com)

    Civic tech volunteers help states with legacy systems

    As COVID-19 exposed vulnerabilities in state and local government IT systems, the newly formed U.S. Digital Response stepped in to help. Its successes offer insight into existing barriers and the future of the civic tech movement.

  • data analytics (Shutterstock.com)

    More visible data helps drive DOD decision-making

    CDOs in the Defense Department are opening up their data to take advantage of artificial intelligence and machine learning tools that help surface insights and improve decision-making.

Stay Connected