Intrusion Prevention Systems
GPTKB entity
Statements (53)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Network Security Technology
|
gptkbp:abbreviation |
gptkb:IPS
|
gptkbp:benefit |
Automate threat response
Reduce risk of cyber attacks |
gptkbp:block |
malware
Exploits Denial-of-service attacks Unauthorized access |
gptkbp:category |
Cybersecurity
Network defense |
gptkbp:challenge |
False positives
Performance impact Evasion techniques |
gptkbp:component |
Defense in depth strategy
|
gptkbp:configuration |
Inline mode
Passive mode |
gptkbp:deployment |
gptkb:Host-based_IPS
gptkb:Network-based_IPS |
gptkbp:distinctFrom |
Intrusion Detection Systems: IPS can block traffic, IDS only detects
|
gptkbp:feature |
Protocol analysis
Real-time protection Anomaly-based detection Policy-based detection Signature-based detection |
gptkbp:function |
Alert administrators
Block suspicious traffic Monitor network traffic |
https://www.w3.org/2000/01/rdf-schema#label |
Intrusion Prevention Systems
|
gptkbp:integratesWith |
Firewalls
Endpoint protection platforms SIEM systems |
gptkbp:introducedIn |
Early 2000s
|
gptkbp:mainVendors |
gptkb:Palo_Alto_Networks
gptkb:Snort gptkb:Cisco gptkb:Fortinet gptkb:Check_Point |
gptkbp:purpose |
Detect and prevent malicious activities
|
gptkbp:regulationCompliance |
gptkb:HIPAA
gptkb:PCI_DSS gptkb:GDPR |
gptkbp:relatedStandard |
gptkb:ISO/IEC_27001
|
gptkbp:relatedTo |
Intrusion Detection Systems
|
gptkbp:requires |
Regular updates
Network integration Signature database |
gptkbp:standardizedBy |
gptkb:NIST_SP_800-94
|
gptkbp:usedIn |
Data centers
Enterprise networks Cloud environments |
gptkbp:bfsParent |
gptkb:Security_Infrastructure
gptkb:Zero-Day_Protection |
gptkbp:bfsLayer |
7
|