Our organization is looking to proactively identify network intrusions, and we've experimented with a number of...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
methods. One that we're probably going to continue is combining a honeypot in the DMZ with an IDS. Are there better low-budget methods for spotting network intrusions?
I strongly endorse the use of an intrusion detection system (IDS) or intrusion prevention system (IPS) on your network. This proven technology can help weed out malicious traffic that could jeopardize your network. For more on this topic, I suggest that you read my tip: Network intrusion prevention systems: Should enterprises deploy now?
From the editors: More on sidebars
Read an excerpt from Virtual Honeypots: From Botnet Tracking to Intrusion Detection.
Honeypots, on the other hand, are dangerous. Ask yourself seriously why you'd want to put a system on your network that is intended to be attacked. Honeypots are implemented with intentional vulnerabilities so that an attacker's activities and methods can be studied. The resulting information can be used to increase network security. But what if something goes wrong with the honeypot configuration, and the attacker is able to gain access to your network? How would you explain that to management? Putting up a honeypot is akin to hanging a sign inviting hackers to attempt to penetrate the network. Unless you're working for a firm specializing in security research, I wouldn't touch that one with a ten-foot pole.
Dig Deeper on Monitoring Network Traffic and Network Forensics
Related Q&A from Mike Chapple
The HHS OCR ruled that healthcare ransomware attacks are HIPAA violations, so these covered entities need to react according to the HHS's guidance. ...continue reading
HIPAA regulations incorporate NIST guidelines and standards, so do healthcare organizations need to be compliant with both? Expert Mike Chapple ...continue reading
Now that NIST has deprecated the use of SMS 2FA, should nongovernment organizations follow suit? Expert Mike Chapple discusses the risks of SMS-based...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.