IDS vs IPS
IDS (Intrusion Detection System): monitors traffic passively and generates alerts when suspicious activity is detected. IDS does not block traffic — it only detects and alerts. Analogy: a security camera that records and alerts. Deployed out-of-band (connected to a SPAN port) — traffic does not flow through the IDS. If the IDS fails, traffic continues unaffected.
IPS (Intrusion Prevention System): monitors traffic inline (traffic flows through the IPS) and can actively block malicious traffic in real-time. If the IPS fails, traffic may be blocked (fail-closed) or allowed (fail-open) depending on configuration. IPS is a preventive control; IDS is a detective control. NGFWs typically include integrated IPS.
NIDS/NIPS (Network-based): monitors network traffic — positioned at key network locations (internet edge, between DMZ and internal). Sees all traffic flowing through the monitoring point. HIDS/HIPS (Host-based): runs on individual systems — monitors system calls, file access, and process behavior on that specific host. Complements NIDS/NIPS by catching threats that reach endpoints.
Detection Methods
Signature-based (misuse detection): compares traffic against a database of known attack signatures. Fast and accurate for known attacks. Cannot detect unknown (zero-day) attacks — no signature exists yet. Requires frequent signature updates. Similar to antivirus signature detection.
Anomaly-based (behavior-based): establishes a baseline of normal behavior and alerts when traffic deviates significantly. Can detect unknown attacks. Higher false positive rate — legitimate but unusual behavior triggers alerts. Requires a learning period to establish baseline.
Heuristic detection: rules-based analysis examining the behavior and characteristics of traffic/code rather than matching exact signatures. Between signature and anomaly-based. Common in modern security products.
False Positives and Negatives
False positive: the IDS/IPS incorrectly identifies legitimate traffic as malicious — generates an unnecessary alert or (for IPS) blocks legitimate traffic. High false positive rates cause alert fatigue and may block business-critical traffic. Signature tuning reduces false positives.
False negative: the IDS/IPS fails to detect actual malicious traffic — the attack succeeds without being flagged. Signature-based systems have high false negatives for zero-days. False negatives are more dangerous than false positives because attacks go undetected.