
An intrusion protection system (IPS) could be just right for you. You want to stop an attack as soon as it's discovered, even if that means closing down legitimate traffic for security concerns. But by the time you're notified of an attack in progress, you may have lost valuable time you could use to protect your assets. You can set one up very quickly, and it's hard for attackers to spot your protections. Machine learning. The system picks up information about everything that happens on your server in an average day, and that data helps to refine the protections in place.Ī system like this comes with plenty of advantages.Prior attacks. The technology flags anything on your server that's been used in a known and successful attack on another server.Patterns. The technology flags unusual requests, very large packet sizes, or anything that seems out of the ordinary for your system at that time.When something is found, you'll get an alert about it. You'll use passive technology to detect an intrusion. No matter what type of IDS you choose, the underlying function is similar. Hybrid: Combine some of the approaches listed above into a system made just for you.Application protocol-based: Place protection within a group of servers and watch how they communicate with one another.


You want to protect the assets on your server. Because of that, some experts believe an IDS/IPS combination is the best way to protect a server.
#Cc check valve vs ips how to
And if you're not sure how to answer right now, you're certainly not alone.īoth systems have advantages and disadvantages. IPS debate? If you work in the IT space, you'll probably be asked this question at some point in your career. But when something unusual happens, the traffic stops altogether until you investigate and decide to open the floodgates again. In the meantime, the traffic keeps flowing.Īn intrusion prevention system (IPS) also monitors traffic. An intrusion detection system (IDS) monitors traffic on your network, analyzes that traffic for signatures matching known attacks, and when something suspicious happens, you're alerted.
