What does IDS mean in Cyber & Security?

This page is about the meanings of the acronym/abbreviation/shorthand IDS in the Computing field in general and in the Cyber & Security terminology in particular.

Intrusion Detection System

Computing » Cyber & Security

Rate it:5.0 / 4 votes

Submitted by paul8539 on December 11, 2009

Translation

Find a translation for Intrusion Detection System in other languages:

Select another language:

  • - Select -
  • 简体中文 (Chinese - Simplified)
  • 繁體中文 (Chinese - Traditional)
  • Español (Spanish)
  • Esperanto (Esperanto)
  • 日本語 (Japanese)
  • Português (Portuguese)
  • Deutsch (German)
  • العربية (Arabic)
  • Français (French)
  • Русский (Russian)
  • ಕನ್ನಡ (Kannada)
  • 한국어 (Korean)
  • עברית (Hebrew)
  • Gaeilge (Irish)
  • Українська (Ukrainian)
  • اردو (Urdu)
  • Magyar (Hungarian)
  • मानक हिन्दी (Hindi)
  • Indonesia (Indonesian)
  • Italiano (Italian)
  • தமிழ் (Tamil)
  • Türkçe (Turkish)
  • తెలుగు (Telugu)
  • ภาษาไทย (Thai)
  • Tiếng Việt (Vietnamese)
  • Čeština (Czech)
  • Polski (Polish)
  • Bahasa Indonesia (Indonesian)
  • Românește (Romanian)
  • Nederlands (Dutch)
  • Ελληνικά (Greek)
  • Latinum (Latin)
  • Svenska (Swedish)
  • Dansk (Danish)
  • Suomi (Finnish)
  • فارسی (Persian)
  • ייִדיש (Yiddish)
  • հայերեն (Armenian)
  • Norsk (Norwegian)
  • English (English)

Definition

What does IDS mean?

Intrusion detection system
An intrusion detection system (IDS) is a device, or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.IDS types range in scope from single computers to large networks. The most common classifications are network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). A system that monitors important operating system files is an example of an HIDS, while a system that analyzes incoming network traffic is an example of an NIDS. It is also possible to classify IDS by detection approach. The most well-known variants are signature-based detection (recognizing bad patterns, such as malware) and anomaly-based detection (detecting deviations from a model of "good" traffic, which often relies on machine learning). Another common variant is reputation-based detection (recognizing the potential threat according to the reputation scores). Some IDS products have the ability to respond to detected intrusions. Systems with response capabilities are typically referred to as an intrusion prevention system. Intrusion detection systems can also serve specific purposes by augmenting them with custom tools, such as using a honeypot to attract and characterize malicious traffic.

see more »

Popularity rank by frequency of use

How popular is IDS among other acronyms?

IDS#1#672#12977

Embed

Citation

Use the citation below to add this abbreviation to your bibliography:

Style:MLAChicagoAPA

"IDS." Abbreviations.com. STANDS4 LLC, 2024. Web. 23 Apr. 2024. <https://www.abbreviations.com/term/335862>.

Discuss this IDS abbreviation with the community:

0 Comments

    Browse Abbreviations.com

    Free, no signup required:

    Add to Chrome

    Get instant explanation for any acronym or abbreviation that hits you anywhere on the web!

    Free, no signup required:

    Add to Firefox

    Get instant explanation for any acronym or abbreviation that hits you anywhere on the web!

    Quiz

    The ultimate acronym test

    »
    BRB
    A Be Regularly Back
    B Be Right Bold
    C Be Right Back
    D Be Really Brilliant