Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL

Part 1: Policy-based networking > Chapter 5: Intrusion Detection Services (IDS) - Pg. 151

5 Chapter 5. Intrusion Detection Services (IDS) Intrusion is a term describing undesirable activities. The objective of an intrusion may be to acquire information that a person is not authorized to have. It may be to gain unauthorized use of a system as a stepping stone for further intrusions elsewhere. It may also be to cause business harm by rendering a network, system, or application unusable. Most intrusions follow a pattern of information gathering, attempted access, and then destructive attacks. Intrusion Detection Services (IDS) thus guards against these intrusions, thereby providing protection against potential hackers. This chapter discusses the following. Section 5.1, "What IDS is" on page 152 5.2, "Basic concepts" on page 152 5.3, "How IDS is implemented" on page 161 Topic This section covers the different types of intrusions, and how policies are used to fend them off. Here details are given about the scan detection, attack detection, and traffic regulation. This section covers the use of eServer IDS Configuration Manager to create IDS policies, which are loaded into LDAP. © Copyright IBM Corp. 2006. All rights reserved. 151