Skip to main content

The figure shows how an IPS works. Data travels from a user to the IPS sensor which compares the traffic with known malicious signatures. The sensor drops any data that it dtermines is maicious. The management concols logs the events.