What is an intrusion prevention system?
![Image](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglRGiof6K56Rhe_FiRJlDveHe5YPl6hy2Bp9ZoYFsUPPFJ0e_Hby9Vd8Xa-i9Yz4imbwBSD5eQnc3oPMoeQPTK4cVxxfurwEzdePuPdsLlBOyYy-ZTmqyK7WzNVJzsjFgB0iZXbii8Coxl/s320/hl-intrusion-prevention-system.jpg)
I ntrusion Prevention and Detection System Basics An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits. Vulnerability exploits usually come in the form of malicious inputs to a target application or service that attackers use to interrupt and gain control of an application or machine. Following a successful exploit, the attacker can disable the target application (resulting in a denial-of-service state), or can potentially access to all the rights and permissions available to the compromised application. Prevention The IPS often sits directly behind the firewall and it provides a complementary layer of analysis that negatively selects for dangerous content. Unlike its predecessor the Intrusion Detection System (IDS)—which is a passive system that scans traffic and reports back on threats—the IPS is placed inline (in the direct communication path betwee