Intrusion detection system (IDS)
nouncandidate·updated May 9, 2026
Software or hardware product that detects and logs inappropriate, incorrect, or anomalous activity. It gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organizations) and misuse (attacks from within the organizations). IDS are typically characterized based on the source of the data they monitor: host or network. A host-based IDS uses system log files and other electronic audit data to identify suspicious activity. A network-based IDS uses a sensor to monitor packets on the network to which it is attached.
MWE
Classifications
Entity Type
Capability92%llm-generatedllm:claude-haiku-4-5
?unassignedlast reviewed —
Sensitivity
—60%llm-generatedllm:claude-haiku-4-5
?unassignedlast reviewed —
Information Class
—50%llm-generatedllm:claude-haiku-4-5
?unassignedlast reviewed —
Variants
- plural
- Intrusion detection system (IDS)S
- possessive
- Intrusion detection system (IDS)'s
- pluralpossessive
- Intrusion detection system (IDS)S'