Misplaced Pages

Application protocol-based intrusion detection system

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
The topic of this article may not meet Misplaced Pages's general notability guideline. Please help to demonstrate the notability of the topic by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be merged, redirected, or deleted.
Find sources: "Application protocol-based intrusion detection system" – news · newspapers · books · scholar · JSTOR (April 2012) (Learn how and when to remove this message)

An application protocol-based intrusion detection system (APIDS) is an intrusion detection system that focuses its monitoring and analysis on a specific application protocol or protocols in use by the computing system.

Overview

An APIDS will monitor the dynamic behavior and state of the protocol and will typically consist of a system or agent that would typically sit between a process, or group of servers, monitoring and analyzing the application protocol between two connected devices.

A typical place for an APIDS would be between a web server and the database management system, monitoring the SQL protocol specific to the middleware/business logic as it interacts with the database.

Monitoring dynamic behavior

At a basic level an APIDS would look for, and enforce, the correct (legal) use of the protocol.

However at a more advanced level the APIDS can learn, be taught or even reduce what is often an infinite protocol set, to an acceptable understanding of the subset of that application protocol that is used by the application being monitored/protected.

Thus, an APIDS, correctly configured, will allow an application to be "fingerprinted", thus should that application be subverted or changed, so will the fingerprint change.

See also

References

  1. "6 Types of Intrusion Detection System". internationalsecurityjournal.com. 2024-04-01. Retrieved 2024-07-09.
  2. "What is an Intrusion Detection System (IDS)? | IBM". www.ibm.com. 2023-04-19. Retrieved 2024-07-09.


Stub icon

This article related to a type of software is a stub. You can help Misplaced Pages by expanding it.

Stub icon

This security software article is a stub. You can help Misplaced Pages by expanding it.

Categories: