Intrusion Detection and Prevention Systems
GPTKB entity
Statements (56)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cybersecurity_technology
|
| gptkbp:abbreviation |
IDPS
|
| gptkbp:alerts |
security administrators
|
| gptkbp:canBe |
gptkb:hybrid
gptkb:personal_computer gptkb:software quarantine logging alerting shunning blocking |
| gptkbp:challenge |
false positives
false negatives performance impact encrypted traffic analysis |
| gptkbp:component |
network security
|
| gptkbp:detects |
gptkb:malware
unauthorized access policy violations intrusions |
| gptkbp:distinctFrom |
Intrusion Detection Systems do not block attacks
Intrusion Prevention Systems can block attacks |
| gptkbp:evolvesFrom |
Intrusion Detection Systems
|
| gptkbp:introducedIn |
1990s
|
| gptkbp:mainVendors |
gptkb:IBM
gptkb:Palo_Alto_Networks gptkb:Snort gptkb:Cisco gptkb:McAfee |
| gptkbp:monitors |
network traffic
system activities |
| gptkbp:prevention |
data breaches
malicious activity intrusions |
| gptkbp:purpose |
prevent unauthorized access
detect malicious activity |
| gptkbp:relatedTo |
gptkb:security
firewalls SIEM |
| gptkbp:response |
security incidents
|
| gptkbp:standardizedBy |
gptkb:NIST
gptkb:ISO/IEC_27001 |
| gptkbp:type |
Host-based IDPS
Network Behavior Analysis IDPS Network-based IDPS Wireless IDPS |
| gptkbp:usedIn |
data centers
enterprise networks industrial control systems cloud environments |
| gptkbp:uses |
anomaly detection
signatures behavioral analysis |
| gptkbp:bfsParent |
gptkb:ISO/IEC_27039
|
| gptkbp:bfsLayer |
8
|
| http://www.w3.org/2000/01/rdf-schema#label |
Intrusion Detection and Prevention Systems
|