Network Intrusion Detection (NID)

Network based intrusion detection attempts to identify unauthorized, illicit, and anomalous behavior based solely on network traffic. A network IDS, using either a network tap, span port, or hub collects packets that traverse a given network. Using the captured data, the IDS system processes and flags any suspicious traffic. Unlike an intrusion prevention system, an intrusion detection system does not actively block network traffic. The role of a network IDS is passive, only gathering, identifying, logging and alerting. Examples of Network IDS:

Contact Top Recruiter NETwork:

charles@fpchuntsville.com
charles@toprecruiter.net

GoTo: Top Recruiter NETwork Home Page