A NIDS/NIPS looks at attacks coming into the network at large instead of into a particular host
malformed network traffic or
excessive amounts of traffic
malicious content embedded in traffic, or other forms of malware
massive distributed denial-of-service (DDoS) conditions, such as those caused by botnet attacks.
One point of interest is the difference between a NIDS and a NIPS
A NIDS is a passive device
alerts an administrator to these issues, also logging the events in the process
A NIPS, in contrast, is an active device
tries to prevent or stop attacks by taking a series of preconfigured actions,
dynamically block traffic
shunting traffic to other interfaces, initiating other security actions, tracing the attack back to its origin,
considered a prevention control,
A behavior- or anomaly-based system detects attacks after comparing traffic with a baseline of patterns considered normal for the network
given the opportunity to “learn” how the normal flow of traffic behaves over the network
good baseline of normal network traffic,
detect any unusual or anomalous traffic patterns that don’t fit into the normal network traffic patterns and issue alerts on them as potential attacks.
A signature-based system,
uses preconfigured signature files,
antimalware applications work, which are stored in the NIPS/NIDS database
define certain attack patterns based upon known traffic characteristics
have its signatures database updated frequently, since new attack patterns are recorded by the security community often
subscription-based service from the NIDS/NIPS vendor,
rule-based system
preconfigured rules in a rule set, much like a firewall, to detect possible attacks
detect an excessive number of Internet Control Message Protocol (ICMP) packets
rule would be activated,
alert would be sent or the attack would be stopped (in the case of a NIPS)
heuristic system
combines the best of both anomaly-based and signature-based systems
It starts out with a database of attack signatures and adapts them to network traffic patterns
It learns how different attacks manifest themselves on the particular network in which it is installed and adjusts its detection algorithms to fit the combination of network traffic behavior and signatures
modern NIDS/NIPS are hybrid systems and may use both techniques
Host-based IDS/IPS systems, in contrast, are almost always signature-based products.