Intrusion detection systems
IDSs, or more specifically, network intrusion detection systems (NIDSs) as opposed to host intrusion detection systems (HIDSs), rely on a network functionality called port mirroring or devices such as network taps to analyze duplicated traffic sent on a dedicated switch port. Most of the manageable modern switches offer port mirroring functionality. IDSs are one of the key components a blue team may rely on for network analysis. In large companies, it is not always possible in terms of architecture to send traffic from all switches. In such a situation, the traffic should be mirrored at the company core switch level. As usual, there are commercial and open source solutions. Some solutions, such as Darktrace, offer beautiful user interfaces and are powered by artificial intelligence (AI) or machine learning (ML) engines, and need to learn from existing traffic. As usual, open source alternatives exist, such as Suricata, Snort, and Zeek. These IDSs don&apos...