© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies
This document introduces tools used to systematically monitor network
activity and discusses the deployment strategies of such systems. Regardless of the
size of the network, having the ability to monitor network activity is a key
component of defending information systems from attacks launched through various
networks as well as finding internal systems that may not be configured correctly
resulting in extraneous traffic absorbing valuable network throughput. We begin
with an introduction of what network intrusion detection systems and intrusion
prevention systems are, then discuss connecting and deploying such devices. The
paper then concludes after mentioning examples utilizing these systems in practical
environments. There is no single security measure sufficient to independently
protect information systems. Having a layered security architecture greatly reduces
risk to system users. One invaluable layer is comprised of network intrusion
detection systems.