DOI: https://doi.org/10.36719/2663-4619/115/319-322
Sevil Hagverdiyeva
Azerbaijan State Agrarian University
https://orcid.org//0009-0000-1238-8338
sevil.haqverdiyeva@gmail.com
Anar Guliyev
Azerbaijan State Agrarian University
https://orcid.org//0009-0002-5549-4063
anar_guliyev74@mail.ru
Ulviyya Safarova
Azerbaijan State Agrarian University
https://orcid.org/0009-0004-1102-2114
ulviyaeldar@mail.ru
Sima Mammadova
Azerbaijan State Agrarian University
https://orcid.org/0009-0006-5163-3598
simamemmedova9642@gmailcom
IDS (Intrusion Detection System) Security System in
Corporate Networks
Abstract
Security technology is developing rapidly with the rapid increase in the number and types of security-related threats. In order to ensure network security and prevent unauthorized persons from entering the system and capturing or changing data, identification and access control security mechanisms were first developed. However, even a system with very good access control and identification has some weaknesses. Identification and access control constitute the first layer of security defense. Due to the increase in threats, new mechanisms are needed in addition to the mechanisms we have listed. Mechanisms such as firewall, VS (Vulnerability Scanner), IDS provide a second layer of defense for the network. Each of the security mechanisms we have mentioned is not sufficient for security separately. According to the security architecture of the corporation, for a secure system, these tools should be used in a way that supports each other.
IDS is a system that monitors legal and illegal processes. This system collects and analyzes all information related to both internal and external sessions. If any illegal situation is detected, it warns you through various means. It has taken its place in the corporate network architecture as an additional tool for network administrators. It checks and analyzes the activity of all internal and external networks. It is able to reveal all suspicious cases - system intrusion and other similar cases.
Keywords: Corporate network, security, identification, threats, defense system