Considering traditional protections
Understanding the threats to your network is a good first step because knowing about the threat is the first step in avoiding it. However, now it’s time to do something about the threats. Anything that protects your network directly because of some type of detection practice is part of an Intrusion Detection System (IDS). It doesn’t matter whether the protection is a firewall, virus scanner, or other software that checks data in some manner, an actual security element designed to fool the attacker in some manner, or (as described later) an ML application. All of this protection reports an intrusion after detecting it, making it an IDS. Of course, you often find the term IDS cloaked in some sort of mystical way (depending on the organization/author), but really, they’re straightforward. As described in the previous section, attacks come in waves and at different levels. Consequently, you need multiple layers of security (defense...