Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Intrusion Detection

A security mechanism that monitors network traffic or system activity to identify and alert on suspicious or malicious behavior.

An Intrusion Detection System (IDS) monitors network traffic, system logs, or application behavior to identify suspicious activity that may indicate an attack or policy violation. Unlike a firewall that blocks traffic based on rules, an IDS analyzes patterns and raises alerts for human review or automated response. It acts as a security camera rather than a locked door.

How It Works

Network-based IDS (NIDS) inspects traffic flowing across a network segment, analyzing packet headers and payloads for known attack signatures or anomalous patterns. It can detect port scans, exploit attempts, command-and-control communication, and data exfiltration. The sensor typically operates in promiscuous mode, passively monitoring a copy of the traffic without sitting inline.

Host-based IDS (HIDS) runs on individual servers and monitors system-level events: file modifications, process execution, log entries, registry changes, and user activity. It can detect unauthorized configuration changes, privilege escalation attempts, rootkit installation, and suspicious process behavior that network-level monitoring would miss.

Detection approaches fall into two categories. Signature-based detection compares observed activity against a database of known attack patterns. It is accurate for known threats but blind to novel attacks. Anomaly-based detection establishes a baseline of normal behavior and alerts when activity deviates significantly. This catches unknown attacks but generates more false positives, requiring tuning and ongoing maintenance.

An Intrusion Prevention System (IPS) extends IDS by sitting inline in the traffic path and actively blocking detected threats rather than just alerting. This provides faster response but carries the risk of blocking legitimate traffic if detection rules are not well-tuned.

Why It Matters

Perimeter defenses alone are insufficient. Attackers who bypass firewalls and WAFs need to be detected before they achieve their objectives. IDS provides visibility into what is happening within the network and on individual systems, closing the gap between prevention and response.

During security assessments, testers note whether their activities trigger alerts, helping organizations evaluate the effectiveness of their detection capabilities and identify blind spots in their monitoring coverage.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment