This report provides an overview of IPS systems. In the first section a comparison of IDS and IPS is made, where an IPS system is defined as an integration of IDS and a firewall. The second section describes what is needed to set up an IPS system. In the third section, IPS alternatives are discussed for different types of organizations. The fourth section describes the dangers of e-mail and the need of an E-mail Exploit Detection Engine that has many characteristics of an Intrusion Prevention System. The conclusion summarizes what should be taken into consideration when deciding on an Intrusion Prevention System.
Unfortunately, ACM prohibits us from displaying non-influential references for this paper.
To see the full reference list, please visit http://dl.acm.org/citation.cfm?id=1456638.