What is an IDS (Intrusion Detection System)?

An IDS is an Intrusion Detection System – a system designed to detect and report unauthorised, suspicious or malicious activities on a network or system.

The aim of an IDS is to detect threats early, so that action can be taken, without intervening directly the way a firewall or IPS (Intrusion Prevention System) would.


🧠 How does an IDS work?

An IDS inspects network traffic or system logs and compares them with:

  • Signatures of known attacks (such as viruses or exploits)
  • Anomalies relative to normal behaviour (e.g. unusual data traffic or timing)

An IDS can detect and log either in real time or offline (after the event).


📦 Types of IDS

Type Description
NIDS Network-based IDS: monitors network traffic
HIDS Host-based IDS: monitors activity on individual devices
Passive IDS Detects and reports, but does not intervene itself
Active IDS Reports and automatically performs predefined actions (hybrid with IPS)

🏭 IDS in industrial networks (OT)

In OT environments, IDS is used to monitor:

Industrial IDSs (such as Nozomi, Claroty or Dragos) are specifically designed for OT protocols.


🔐 IDS and Defence in Depth

An IDS is an important component of a broader Defense in Depth strategy, alongside:


📌 In summary

An IDS is a security system that helps detect cyberattacks, unwanted access or anomalous behaviour in good time. In industrial environments, it forms a critical layer between detection and response, without directly disrupting processes.


Want examples of IDS alerts or a comparison between IDS and IPS? Let me know!