CyberGlossary

Network Security

Network-Based IDS (NIDS)

Also known as: NIDS, Network IDS

Definition

An intrusion-detection sensor that inspects traffic captured from a network segment to identify malicious patterns and policy violations.

A Network-Based Intrusion Detection System (NIDS) receives a mirrored or tapped copy of network traffic — via SPAN ports, network TAPs, packet brokers, or virtual taps — and analyses it with signatures (Snort/Suricata rules), protocol decoders (Zeek), and statistical models. NIDS deployments give broad visibility into many hosts without per-endpoint software, are useful for north-south and east-west monitoring, and are foundational sensors for SOC and threat-hunting teams. Because TLS encrypts much of today's traffic, NIDS increasingly relies on TLS metadata, JA3/JA4 fingerprints, and behavioural flow analytics. Effective use requires careful tap design, capture sizing, accurate clock sync, and integration with SIEM and NDR pipelines.

Examples

  • Suricata on a SPAN port alerting on the ET CINS rule set for known C2 IPs.
  • Zeek scripts detecting DNS tunneling by entropy analysis of query labels.

Related terms