Statements (52)
Predicate | Object |
---|---|
gptkbp:instanceOf |
network security technology
|
gptkbp:abbreviation |
gptkb:IPS
|
gptkbp:alternativeName |
Intrusion_Detection_System
Intrusion_Prevention_System intrusion_detection_system |
gptkbp:canBe |
gptkb:personal_computer
gptkb:software cloud-based |
gptkbp:challenge |
false positives
performance impact evasion techniques |
gptkbp:component |
network security infrastructure
|
gptkbp:deployment |
inline with network traffic
|
gptkbp:distinctFrom |
Intrusion Detection System: IPS can block traffic, IDS cannot
|
gptkbp:function |
monitor network traffic
alert administrators block suspicious traffic log security events |
gptkbp:integratesWith |
gptkb:security
firewalls SIEM systems |
gptkbp:introducedIn |
early 2000s
|
gptkbp:marketLeaders |
gptkb:Palo_Alto_Networks
gptkb:Cisco gptkb:Fortinet gptkb:Check_Point gptkb:Trend_Micro |
gptkbp:prevention |
malware
denial-of-service attacks unauthorized access exploits policy violations |
gptkbp:protectedBy |
hosts
networks applications |
gptkbp:purpose |
detect and prevent malicious activities
|
gptkbp:relatedStandard |
gptkb:RFC_4765
gptkb:RFC_4767 |
gptkbp:relatedTo |
intrusion prevention system
|
gptkbp:requires |
regular updates
tuning to reduce false positives |
gptkbp:standardizedBy |
gptkb:NIST
gptkb:ISO/IEC_27001 |
gptkbp:type |
gptkb:Host-based_IPS
gptkb:Network-based_IPS gptkb:Network_Behavior_Analysis_IPS gptkb:Wireless_IPS |
gptkbp:uses |
anomaly detection
signatures policy-based detection |
gptkbp:bfsParent |
gptkb:security
|
gptkbp:bfsLayer |
4
|