Intrusion protection: why it is needed, what is involved, what are the pitfalls and challenges?

May 2005 Information Security

Intrusion protection takes the argument for intrusion detection one stage further, by not just discovering attacks on a network, but blocking and preventing them from happening again.

With companies becoming increasingly active on the Internet, the need for intrusion detection and prevention has never been more important. Network security specialist, IDsec, estimates that an average company may receive anywhere between 10 and 100 attacks on its network per day. Any company with an Internet presence is at risk and having a firewall is simply not enough.

A growing problem

When a company connects to the Internet, it is potentially opening up a whole can of worms. Malicious attacks on company networks are becoming more frequent, effective and wide-ranging. The ingenuity of hackers has kept pace with Internet development and has become such a growing area of crime that organisations including Interpol and Scotland Yard now have sections devoted to tackling this problem. The past couple of years has seen a convergence of virus, worms and spam, so that some attacks very cleverly have several phases. In other words, the way that they infect one system is not necessarily the means they use for onward transmission to the next victim.

The people who carry out these attacks are smart. They know that most companies have firewalls, but this is a challenge to them, not a deterrent. They may spend months building up a picture of a company's network, such as what ports are open and what external servers and operating systems are being used. All this means that for many companies - particularly smaller ones with fewer resources - they will not know whether they have been hacked until something goes wrong (and in some cases, not even then: IDsec has had one client where a thriving hacker community was running a dodgy bulletin board on one of the client's servers without any of the staff being aware of its existence).

A firewall is not enough

Many companies realise the importance of Internet security, but may have simply installed a firewall. While there is a definite role for firewalls, they are not sufficient protection. They only protect what they can see and generally, do not have the inbuilt 'intelligence' to interrogate data packets thoroughly and inevitably let through a significant number of packets that ought to be examined in more depth. If a data packet is from a valid source and destination and aimed at the right port, then it will let it pass. This is the role of firewalls: after all, if they were to spend too much time dwelling on each data packet, then the network would slow down and no-one wants that.

The best security efforts of a company are often undermined by its own staff, who may unwittingly be introducing malicious data from outside the realm of the firewall. Infection of the internal network is one of the biggest problems for companies today. For example, a modem link used by a member of staff to carry out remote work out of hours would not be examined by the network firewall.

Similarly, a laptop used by a member of staff at home is not covered by the firewall: IDsec knows of one case where a single laptop infected during an Internet session at home wreaked havoc on the corporate network the next day. With an increasing number of IP-enabled devices, all feeding back in to company networks, the protection that the firewall can offer is challenged even further.

Intrusion detection systems cannot promise to solve all of a company's security problems, but they can certainly reduce them, by giving a far better idea of what the outside world is trying to do to the company network. An intrusion detection solution can automatically flag attacks as soon as they happen, rather than a company finding out next time a member of staff remembers to read the firewall logs. This means that companies can react far more quickly to malicious attacks.

Intrusion detection has been available for some time, although, until now, not within the reach of many smaller companies. The reasons for this are simple: intrusion detection systems have traditionally involved a number of different components, all of which need to be integrated with one another, a task that can be complex.

The net result is that traditional intrusion detection systems have been expensive and on-going cost of ownership and management effort has been high. Many companies have therefore felt overwhelmed at the prospect of intrusion detection and even if they bought systems, these often ended up as 'shelfware' that was never properly used. Fortunately, multifunctional devices such as the Proventia M-Series solve this in a single unit and are therefore ideal for smaller businesses. However, larger organisations cannot afford to be complacent about intrusion detection and there is always room for improvement in this important area.

For more information contact IDsec, 0944 20 8861 2001, or visit www.idsec.co.uk





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.