What low-budget methods can identify network attacks proactively?

Instead of using a honeypot, Mike Chapple has a better recommendation for weeding out malicious traffic that could jeopardize your enterprise network.

Our organization is looking to proactively identify network intrusions, and we've experimented with a number of...

methods. One that we're probably going to continue is combining a honeypot in the DMZ with an IDS. Are there better low-budget methods for spotting network intrusions?

I strongly endorse the use of an intrusion detection system (IDS) or intrusion prevention system (IPS) on your network. This proven technology can help weed out malicious traffic that could jeopardize your network. For more on this topic, I suggest that you read my tip: Network intrusion prevention systems: Should enterprises deploy now?

From the editors: More on sidebars

Read an excerpt from Virtual Honeypots: From Botnet Tracking to Intrusion Detection.

Honeypots, on the other hand, are dangerous. Ask yourself seriously why you'd want to put a system on your network that is intended to be attacked. Honeypots are implemented with intentional vulnerabilities so that an attacker's activities and methods can be studied. The resulting information can be used to increase network security. But what if something goes wrong with the honeypot configuration, and the attacker is able to gain access to your network? How would you explain that to management? Putting up a honeypot is akin to hanging a sign inviting hackers to attempt to penetrate the network. Unless you're working for a firm specializing in security research, I wouldn't touch that one with a ten-foot pole.


This was first published in December 2008

Dig Deeper on Monitoring Network Traffic and Network Forensics



Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: