An Intrusion Prevention System (IPS) is designed to monitor network traffic in real time, identify potential threats, and take automated actions to block or prevent malicious activities from reaching their target. IPS solutions can be implemented as hardware devices or software applications and are typically deployed inline—meaning they sit directly in the flow of network traffic, often just behind a firewall.

The IPS inspects all network traffic as it passes through, analyzing data packets for signs of malicious activity such as malware, denial-of-service (DoS) attacks, or unauthorized access attempts. It compares network packets to a database of known attack signatures. If a match is found, the IPS takes action. It also monitors traffic for deviations from established baselines of normal network behavior, flagging unusual activity as potential threats. It enforces custom security policies set by administrators, triggering alerts or actions if those policies are violated.

When the IPS detects a threat, it can: (1) Block or drop malicious packets (2) Terminate suspicious connections (3) Block traffic from offending IP addresses (4) Reset network connections (5) Alert administrators and log the event for review

Synonyms:
Intrusion Protection System