Browse Definitions :
Definition

breach detection system (BDS)

Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred.

Enterprise IT uses BDS to protect against the variety of advanced threats, especially unidentified malware.  Unlike tier 1 security, such as a firewall or intrusion prevention, that scan incoming traffic, BDS focuses on malicious activity within the network it protects. It determines possible breaches by differing combinations of heuristics, traffic analysis, risk assessment, safe marked traffic, data policy understanding and violation reporting. Using these methods, BDS are able to sometimes find breaches as they occur and at other times detect breaches and side-channel attacks that had not previously been found.

BDS has 3 different deployment methods:

  • Out-of band systems scan data mirrored from port scans from a switch or network tap.
  • In-line systems are deployed between the network and WAN interface just like tier 1 firewalls and intrusion prevention systems.
  • Endpoint deployments that use a client installed on endpoint machines.

Advanced persistent threats (APT) have a number of exploits they can use on a target, depending on what types of Internet applications the target uses and likely vulnerabilities. There are such a variety of threats that it is difficult to impossible for IT to be aware of every possibility. BDS helps with finding the unknown advanced and adaptive threats. Even major websites have been hacked;  furthermore, the average successful breach lasts 16 months. On both counts, there is certainly room to cut down on damages. The use of BDS represent a shift in philosophy from the idea of preventing every intrusion to realizing that intrusions will happen and focusing on catching those intrusions sooner.

BDS need to be configured with details such as operating system, a list of approved applications, and programs allowed to connect to the Internet. An understanding of the attack surface presented by your network is crucial to setting up a successful deployment. To that end, BDS can assess risky configurations, helping IT limit the attack surface.

Data policies can affect what type of BDS is right for an organization. Some BDS in each type of deployment forward their data back to the BDS service provider to do post-processing in their own cloud. If it is critical, however, that data not go offsite, there are also BDS vendors who offer the same level of processing on premises. BDS are a tier 2 security system, sometimes considered 2nd generation intrusion detection systems (IDS).

This was last updated in November 2014

Next Steps

Comparing breach detection systems to IDSes and NGFWs.

Continue Reading About breach detection system (BDS)

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close