
You have many options when it comes to installing intrusion detection devices (IDPs). Some are network-based while others are host-based. Blockchain-based idps can also be found. But what are the advantages and disadvantages of these types of systems? Here are some examples.
Host-based intrusion prevention systems
Host-based intrusion detection systems, also called HIDS, are software applications that monitor activity on a single computer. These systems offer many the same benefits of application-level intrusion protection systems but on a smaller scale. They must transmit their findings to the central monitoring system. This may not be possible during active attack.
Host-based firewalls can be used to protect against a wide range of attacks. They block spam, viruses, Trojan horse programs, keyloggers, buffer overflows, rootkits, and Denial of Service attacks. Many of them have built-in firewall capabilities.

Network-based intrusion detection systems
Network-based intrusion prevent systems (NIPS), use a combination signature-based as well as anomaly-based detection algorithms in order to detect and stop malicious activity. Although signature-based approaches are the best for blocking known attacks they can also cause false positives. NIPS should block all new threats at the application as well as network-level firewall processing in order to be effective.
Network-based intrusion protection systems analyze traffic flow and examine signatures. These systems usually use special-purpose hardware. However, some can also be software-based. A software-based approach may be sufficient for small to midsize enterprises. For large-scale businesses, however, you will need specialized hardware. It is likely that dedicated network security processors as well as application-specific integrated circuits are required.
Cloud-based intrusion protection systems
There are many different types, and it is important for you to choose the one that best suits your needs. Some companies specialize in one type of system or another. Microsoft Intelligent Defense Protection System (IDPS) is a scalable IDPS that Microsoft recently purchased for $20 billion. This system analyzes traffic and determines the risks to network assets. Pricing is very reasonable, starting at $1.75 an hour for deployment and $0.016 per GB processed. Blumira, another company, offers more comprehensive solutions.
An IDPS's key benefit is its ability to keep detailed logs. This allows administrators to see the events occurring on their network. These systems can also create ad-hoc reporting to meet compliance requirements. These systems can also be programmed to automatically detect and respond to potential threats.

Blockchain-based idps
The revolutionary blockchain-based IDPS is a new way to secure data. Its open and decentralized architecture makes data security, accountability, as well as traceability possible. These systems can help protect against fraud and prevent other types of misuse. Although they are not free, these systems can be very efficient in protecting data.
Blockchain is used to protect information in many industries including healthcare, supply chain management and the Internet of Things. Because it is decentralized, its robust cryptography and strong architecture allow it to offer superior security over peer–to-peer networks without the need for a third-party. The blockchain can be used to track and identify quality, detect inefficiencies, and track supply chain items in real time. Microsoft is also investigating the potential benefits of blockchain-based IDPs.