Cyber Security Terms
Intrusion Detection System

What is an Intrusion Detection System?

An intrusion detection system (IDS) identifies cyber attacks on a network or a host. Such attacks could include botnets, Distributed Denial of Service (DDoS), and ransomware.

The system analyzes and monitors suspicious network activity, vulnerability exploits, or policy violations via sensors placed on network devices or the host.

IDSs report any identified threats to an administrator or a security information and event management (SIEM) system.

Types of Intrusion Detection Systems

By Detection Method

  • Signature-based Detection
  • Anomaly-based Detection
  • Reputation-based Detection
  • Stateful Protocol Analysis Detection

By Network Placement

Key takeaways

  • Check icon
    Intrusion detection systems help information security teams identify cyber threats faster and more effectively.
  • Check icon
    They operate by analyzing and monitoring traffic using specially-placed sensors.
  • Check icon
    IDSs can use a range of different detection methods and operate on a network or host level.
  • Check icon
  • Check icon
Reviewed by
No items found.

Read more about Intrusion Detection Systems

Learn more about Intrusion Detection System and the latest issues in cybersecurity.
UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

See UpGuard In Action

Book a free, personalized onboarding call with one of our cybersecurity experts.
Abstract shapeAbstract shape

More from our blog

Learn more about the latest issues in cybersecurity.
Deliver icon

Sign up to our newsletter

Get the latest curated cybersecurity news, breaches, events and updates in your inbox every week.
Abstract shapeAbstract shape
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan ratingAbstract shape