Can an IDS, DMZ and honeypot together achieve better network security?
An IDS and DMZ can be used together to achieve better network security, but expert Mike Chapple explains which tool is too risky to add to the mix.
Your IDS provides you with visibility into activity on your network. It monitors network activity, seeking out...
Continue Reading This Article
Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
suspicious actions that may represent attacks on your network. In IDS mode, the system alerts administrators to this suspicious activity for further investigation. It's also possible to put many systems into intrusion prevention system (IPS) mode, transforming the IDS from a passive device to one that plays an active role in your network security by blocking malicious activity from entering your network in the first place. For more on this topic, see the Intrusion Detection and Prevention Learning Guide.
DMZs allow you to isolate systems that offer public services to Internet users in a single area of your network. You can then provide the DMZ with limited access to your internal network. The goal is to minimize the ability of an intruder to penetrate your internal network if he or she compromises an exposed system in the DMZ. For more information on implementing DMZs, see my Firewall Architecture Tutorial.
Finally, you also asked about honeypots in your question. Unlike the two other technologies you mentioned, I strongly discourage the use of honeypots unless you're conducting active security research and have a need to attract malicious activity to your network. As you may know, honeypots are systems that are designed to be compromised in an effort to attract hackers and malware so that they may be monitored in a controlled environment. This type of activity is extremely risky – if you misconfigure your honeypot, you may wind up with a true compromise on your hands!
More information:
- Find out the best possible IDS for an Enterprise Resource Planning system.
- Learn how to build a solid DMZ.
- Learn more about the risks honeypots pose to enterprises.