Intrusion Prevention Systems
GPTKB entity
Statements (52)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Network_Security_Technology
|
| gptkbp:abbreviation |
gptkb:IPS
|
| gptkbp:benefit |
Automate threat response
Reduce risk of cyber attacks |
| gptkbp:block |
gptkb:malware
Exploits Denial-of-service attacks Unauthorized access |
| gptkbp:category |
Cybersecurity
Network defense |
| gptkbp:challenge |
False positives
Performance impact Evasion techniques |
| gptkbp:component |
Defense in depth strategy
|
| gptkbp:configuration |
Inline mode
Passive mode |
| gptkbp:deployment |
gptkb:Host-based_IPS
gptkb:Network-based_IPS |
| gptkbp:distinctFrom |
Intrusion Detection Systems: IPS can block traffic, IDS only detects
|
| gptkbp:feature |
Protocol analysis
Real-time protection Anomaly-based detection Policy-based detection Signature-based detection |
| gptkbp:function |
Alert administrators
Block suspicious traffic Monitor network traffic |
| gptkbp:integratesWith |
Firewalls
Endpoint protection platforms SIEM systems |
| gptkbp:introducedIn |
Early 2000s
|
| gptkbp:mainVendors |
gptkb:Palo_Alto_Networks
gptkb:Snort gptkb:Cisco gptkb:Fortinet gptkb:Check_Point |
| gptkbp:purpose |
Detect and prevent malicious activities
|
| gptkbp:regulationCompliance |
gptkb:HIPAA
gptkb:PCI_DSS gptkb:GDPR |
| gptkbp:relatedStandard |
gptkb:ISO/IEC_27001
|
| gptkbp:relatedTo |
Intrusion Detection Systems
|
| gptkbp:requires |
Regular updates
Network integration Signature database |
| gptkbp:standardizedBy |
gptkb:NIST_SP_800-94
|
| gptkbp:usedIn |
Data centers
Enterprise networks Cloud environments |
| gptkbp:bfsParent |
gptkb:Security_Infrastructure
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Intrusion Prevention Systems
|