ISP-Planet - Value-Added Services - Intrusion Detection Systems Directory

By: Ispcon  09-12-2011
Keywords: Security

Security risks have grown dramatically for Internet service providers because entire infrastructures are based on open standards systems. As a result, ISPs need to be able to quickly and accurately detect unauthorized changes and respond accordingly, in order to maximize security and minimize downtime.

Intrusion Detection Systems (IDS) remain relatively youthful, but in terms of development they are growing at an extraordinary rate.

Generally speaking, there are four different categories of intrusion detection systems—network instruction detection, system integrity verifiers, log file monitors, and deception systems.

Network intrusion detection systems (NIDS) monitor packets traversing the system in an attempt to discover anomalies, indicating that an intruder trying to break into a system, or worse—launch a distributed denial of service (DDoS) attack. NIDSs look for frequent connection requests to different ports to reveal port scans.

System integrity verifiers (SIV) monitor system files in an attempt to discover when an intruder changes the files—leaving behind a backdoor. A SIV may be capable of detecting changes in critical files, but these systems usually don't generate real-time alerts to network intruders.

Log file monitors (LFM) simply monitor log files generated across network services. LFMs also look for patterns and anomalies in log files that suggest an intruder is attacking the network.

The sole purpose of a deception system—known in the industry as decoys, fly traps and honeypots—is to lure an unsuspecting intruder into a network through well-known security holes and trap the intruder.

Whether you need a simple intrusion alert system and network anomaly reports, or need to defend your network against DDoS attacks, smurfing, ping floods and the like, it's a imperative that you prepare a line of defense today or risk having your business be exploited by some script kiddie tomorrow.

Keywords: Security

Other products and services from Ispcon


ISP-Planet - Value-Added Services - Merchant Account Providers Directory

Far too many credit card processors (and the rest of the banking industry too) still regard ISPs as a new and unproven industry, but several merchants, some of which even predate the milennium, are providing services to internet providers. The merchant service provider has found a niche in working with high-risk merchants like travel agents and ISPs.


ISP-Planet - Value-Added Services - Outsourced Customer Support Directory

The customer base of the outsourcer must be considered, and ISPs are also right to look at the company's finances (some will also want financial information from the ISP, their prospective customer). Outsourcing is meant to allow companies to cut costs and provide better service. ISPs should consider what incentives the pricing strucuture provides.


ISP-Planet - Value-Added Services - Billing Service Directory Quick Reference Chart

There are more than 40 different programs that offer ISP businesses different types of billing services. 179.95 for a 250-client license.


ISP-Planet - Value-Added Services - Anti-Spam Directory

Using both an appliance at the ISP and a hosted system, Red Condor claims more detailed analysis, less management costs, and competitive pricing for a system being sold aggressively to ISPs. Anti-spam products offered to ISPs are no longer mere ports of enterprise systems; most companies now build specific products for the ISP market.


ISP-Planet - Value-Added Services - Billing Service Directory

Whether it's non-paying clients or a simple report, few decisions impact your ISP business day-in and day-out like your billing system and invoicing software bundle. There are more than 40 different programs that offer ISP business different types of billing services.