侵入検知システム(IDS)

A network intrusion detection system (IDS) is a cybersecurity solution designed to identify and generate alerts regarding potential intrusions. Intrusion detection system (IDS) monitors network traffic and creates an alert if suspicious activities or threat signatures are discovered. A valuable security tool, IDSs accelerate the identification and remediation of potential threats. But, they’re not standalone solutions and must be deployed within a broader security framework.

 

デモをリクエストする Miercom 2025 Firewall report

侵入検知システム(IDS)とは?

IDS の仕組み

IDS は、次のいずれかとしてデプロイできます。

  • ネットワークベースのソリューション
  • ホストベースのソリューション

どちらのデプロイメント・ロケーションでも、ネットワーク・トラフィックやその他の悪意のあるアクティビティーを監視して、モニター対象のネットワークまたはデバイスに対する潜在的な侵入やその他の脅威を特定します。 IDS は、潜在的な脅威を特定するために、次のようないくつかの異なる手段を使用できます。

  • 署名ベース: シグネチャベースの検出メカニズムは、一意の識別子を使用して既知の脅威を探します。 たとえば、IDS には、保護されたシステムに侵入しようとする既知のマルウェアを識別するために使用するマルウェア ハッシュのライブラリがある場合があります。
  • 異常ベース: 異常ベースの検出は、ネットワークまたは保護対象デバイス内の正常な動作のモデルを構築することに依存します。 次に、 サイバー攻撃 やその他のインシデントを示す可能性のあるこの規範からの逸脱を探します。

Why use an Intrusion Detection System (IDS)?

Cyberattacks have reached record levels in recent years. Data from the Identity Theft Resource Center found that data breaches in 2024 were the second highest on record, behind only 2023. But, while the number of data breaches remained roughly the same in 2024 as in 2023, the number of victims increased significantly, with attacks affecting many more people.

Data breaches and unauthorized access to your corporate network can have significant consequences, with:

  • Financial costs
  • 風評被害
  • Loss of customers

Organizations must develop robust security strategies to protect their corporate data. There are many methods attackers use to target corporate networks.

With attack vectors such as phishing and other social engineering attacks, unsecured endpoints, software application vulnerabilities, SQL injection, cross-site scripting, insider threats, and more continuously targeting enterprise IT, security teams need tools to monitor network traffic and automate intrusion detection.

An IDS monitors networks for suspicious behavior that needs to be escalated through further investigation or immediate preventative measures (blocking traffic, quarantining files, etc.). IDSs also support compliance by protecting your data and providing reporting.

While generally seen as an incident response trigger, IDSs also provide valuable data about your networks to help identify vulnerabilities and prevent attacks.

The 8 Types of Intrusion Detection Systems

There are many types of intrusion detection systems. From simple antivirus software applications to comprehensive monitoring systems that cover your entire organization: From cloud-based intrusion detection and local on-premises systems, to software applications installed on endpoints and physical hardware placed throughout the network.

The most common ways of distinguishing between the different types of intrusion detection systems are where they are located in the network, and the method by which they identify potential threats.

Network Location

The two most common types of intrusion detection systems based on network location are Network Intrusion Detection Systems (NIDS) and Host-based Intrusion Detection Systems (HIDSs).

Network Intrusion Detection Systems

NIDSs are most commonly positioned at the network perimeter behind firewalls to flag inbound and outbound traffic. However, they can also be used more centrally to target insider threats or compromised accounts. NIDSs are often “out of band” to monitor traffic without impacting network performance.

This means they copy data packets for inspection rather than analyze the original.

Host-Based Intrusion Detection Systems

HIDSs are positioned at specific endpoints (e.g., router, server, etc.) and only monitor traffic passing through the device. HIDSs are often used to periodically monitor vital operating systems, looking for suspicious activities such as edited log files or configuration changes.

It is not uncommon for security teams to rely on NIDSs and HIDSs. Utilizing NIDSs for big-picture information on the entire network and HIDSs for detailed data related to the most important systems.

Other types of IDS include:

  • Protocol-based Intrusion Detection System (PIDS): Tracks connection protocols such as HTTP or HTTPS.
  • Application Protocol-based Intrusion Detection System (APIDS): Monitors application-specific protocols, for example, protecting against SQL injections.

Detection Method

The two main types of intrusion detection systems based on detection methods are signature and anomaly approaches.

Signature-Based IDS

As attack vectors are identified and studied, we are able to identify the specific patterns they follow.

These are known as signatures, and signature-based IDSs inspect network traffic to identify the patterns associated with potential threats.

To implement signature-based detection, the IDS requires an up-to-date threat database containing the latest known attack signatures. This approach is inherently more reactive. It requires that threats be observed and their signatures be identified and input into security tool databases.

You are susceptible to new attacks and must regularly update your IDS to ensure the best protection.

Anomaly-Based IDS

In contrast, anomaly-based methods take a more proactive approach to IDS, identifying any suspicious activity regardless of whether it follows a previously seen threat.

Anomaly-based IDS uses machine learning behavioral analysis to monitor your network and develop a model for normal network activity. By learning what safe network traffic looks like, the technology can identify instances that deviate from the model, potentially signaling an attack.

As it is based purely on identifying real-time anomalous behavior, not known signatures, this approach can catch new threats like zero-day exploits. 

But, the quality of anomaly-based IDS depends on how it is implemented. The method can be prone to sending false positives that incorrectly class behavior as suspicious and waste the time and resources of security teams. Taking into account contextual information can improve performance, providing a better understanding of normal activities and reducing the rate of false positives.

Other Detection Methods

Other types of intrusion detection systems incorporate lesser-used detection methods, such as:

  • Reputation-based detection: Blacklists specific IP addresses and domains known for malicious activities and blocks all traffic from them.
  • Stateful protocol analysis: Blocks traffic depending on protocol behavior. For example, blocking an IP address that makes a large number of requests in a short period to prevent denial-of-service attacks.

IDS の 7 つの最も一般的な課題

IDSは、企業のセキュリティアーキテクチャの貴重なコンポーネントになる可能性があります。 しかし、IDSを使用する際には、組織が一般的に次のような課題に直面します。

  1. 正しくない検出: IDS は、シグネチャと異常検出メカニズムの組み合わせを使用でき、ファイアウォールの設計が強化されていないと、どちらも間違いを犯す可能性があります。 シグネチャ検出は、新しいマルウェアの亜種のデータベースに署名がない場合、偽陰性が発生しやすくなります。 異常検出は、良性の異常が誤って潜在的な脅威として分類された場合、誤検知になる可能性があります。
  2. アラート ボリューム: IDSの設計が劣っていると、セキュリティ担当者が検索してトリアージする必要がある大量のアラートが生成されることがよくあります。 セキュリティチームは簡単に圧倒され、多くのアラートが誤検知である場合、それらを無視し始め、侵入を見逃す可能性があります。
  3. アラート調査: IDS アラートは、多くの場合、セキュリティ インシデントに関する基本情報を提供しますが、重要なコンテキストが不足している可能性があります。 その結果、セキュリティ担当者は、インシデント対応をトリガーしたり、誤検知として却下したりする前に、アラートの調査と理解に多大な時間と労力を費やす可能性があります。
  4. No 脅威対策: IDSは、潜在的な脅威を特定し、それについてセキュリティチームに警告するように設計されています。 実際に脅威を防ぐことはできず、手動の対応操作がトリガーされる前に組織を攻撃するウィンドウが残されます。 アラートが見逃されたり無視されたりした場合、セキュリティチームはインシデントにさえ対応できない可能性があります。
  5. アラート疲労: IDS は、組織に警告するためにのみ設計されています。 統合されたIDS+IPS(Intrusion Prevention Service)による自動応答がないため、セキュリティチームはより高いワークロードに悩まされています。 そして多くの場合、これらのチームは、調査する「データ」が多すぎることに基づいて、常にアラートを無視したりミュートしたりします。
  6. 構成とメンテナンス: 潜在的なセキュリティリスクを適切に特定するには、IDS を適切にデプロイ、構成、および保守する必要があります。 これには、他の場所で使用される可能性のある専門知識とリソースが必要です。
  7. リソース要件: IDS は、特に大きなシグネチャ ディクショナリや高度な異常検出アルゴリズムを備えている場合、脅威を特定するために大量のリソースを消費する可能性があります。 これらは、システムのパフォーマンスを低下させたり、IDS がインラインで展開されている場合にパフォーマンスが低下したりする可能性があります。 さらに、シグニチャライブラリは、最新の脅威を特定するために頻繁に更新する必要があります。

侵入検知システム(IDS)と侵入防止システム(IPS)

As noted, an IDS only generates alerts. It does not intercept or block threats.

A similar security tool that provides additional capabilities is an Intrusion Prevention System (IPS), which identifies potential threats and automatically intercepts them. This could be directly responding via blocking traffic or indirectly responding by activating other tools.

These systems accelerate threat response even more than an IDS, preventing attacks before they have a chance to infiltrate your network. But, automated responses mean that false positives will block legitimate traffic, impacting operations. IDS vs. IPS creates a trade-off between the speed of protection and blocking legitimate traffic, between security and usability.

Challenges and Limitations of IDS

While IDSs offer a range of threat protection benefits, implementation challenges and performance limitations exist. These include:

  • Slowing down network performance by inspecting traffic.
  • Complex installation and determining the optimal implementation in terms of IDS solution types.
  • Regular updates and maintenance to ensure your IDS has the latest signatures and provides comprehensive coverage.
  • Implementation requires a lot of work for a detection system that doesn’t prevent attacks by itself.
  • False positives waste IT resources that could be spent investigating genuine threats and potentially lead to alert fatigue and underestimating real attacks.

There are also specific evasion tactics attackers can utilize to bypass IDSs. Methods include:

  • A Distributed Denial-of-Service (DDoS) attack is used as a decoy to take IDSs offline, followed by a genuine attack once defenses are down.
  • Obscuring マルウェア signatures through fragmentation and finding inventive ways to split the payload across different packets.
  • Bypassing IDSs by using encrypted protocols.
  • 住所 spoofing or proxy servers are used to hide the source of traffic.

IDS/IPSソリューションの選択 with チェック・ポイント

Check Point’s next-generation firewall, Quantum, incorporates intrusion prevention systems to detect and prevent attempts to gain unauthorized access. Quantum simplifies IPS management with automatic updates to maintain comprehensive threat databases and protect your systems.

However, if you want to go further and integrate all the security functionality you need into a single platform while maintaining network performance consider Harmony SASE – the future of cybersecurity.