{"id":2871,"date":"2022-03-03T19:03:03","date_gmt":"2022-03-03T19:03:03","guid":{"rendered":"https:\/\/bulutistan.com\/blog\/?p=2871"},"modified":"2023-09-08T18:34:06","modified_gmt":"2023-09-08T18:34:06","slug":"ips-nedir","status":"publish","type":"post","link":"https:\/\/bulutistan.com\/blog\/ips-nedir\/","title":{"rendered":"IPS Nedir? IPS vs. IDS Farklar\u0131"},"content":{"rendered":"<p><b>Intrusion Detection System (IDS)<\/b><span style=\"font-weight: 400;\"> ve <b>Intrusion Prevention System (IPS)<\/b><span style=\"font-weight: 400;\"> terimlerini duydu\u011funuzda, her ikisinin de ayn\u0131 t\u00fcr izinsiz giri\u015fi engelleyen bir siber g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcne at\u0131fta bulundu\u011funu varsayabilirsiniz. Fakat bu iki kavram benzer ama\u00e7lara hizmet etseler de, ayn\u0131 \u015feyi yapmazlar. IDS&#8217;ler ve IPS&#8217;ler, i\u015fletmenizin bilgi teknolojisi (BT) altyap\u0131s\u0131n\u0131 kilitlemek ve dolay\u0131s\u0131yla onu siber tehditlere kar\u015f\u0131 korumak i\u00e7in farkl\u0131 \u015fekillerde \u00e7al\u0131\u015f\u0131r.<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Peki IPS nedir, IDS nedir ve\u00a0 IPS vs. IDS aras\u0131ndaki farklar nelerdir?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bu yaz\u0131da t\u00fcm bu sorular\u0131n cevaplar\u0131n\u0131 detayl\u0131ca anlataca\u011f\u0131z, fakat \u00f6ncesinde a\u011f sald\u0131r\u0131s\u0131 nedir konusuna de\u011finelim.\u00a0<\/span><\/p>\n<h2 id=\"ag-saldirisi-network-intrusion-nedir\">A\u011f Sald\u0131r\u0131s\u0131 (Network Intrusion) Nedir?<\/h2>\n<p><span style=\"font-weight: 400;\">\u0130zinsiz giri\u015f, g\u00fcvenli\u011fi ihlal ederek veya g\u00fcvenli olmayan bir a\u011fa eri\u015fmeye zorlayarak bir bilgisayar sistemini tehlikeye atar. Dijital bir a\u011fdaki herhangi bir istenmeyen etkinlik, bir a\u011fa izinsiz giri\u015f olarak kabul edilir. Genellikle \u00f6nemli a\u011f kaynaklar\u0131n\u0131n \u00e7al\u0131nmas\u0131n\u0131 i\u00e7erir ve s\u0131kl\u0131kla a\u011flar\u0131n ve verilerinin g\u00fcvenli\u011fini tehlikeye atar. Bir izinsiz giri\u015fi tespit edebilmek, temel g\u00fcvenlik tehlikelerinin yan\u0131 s\u0131ra a\u011f faaliyetleri hakk\u0131nda kapsaml\u0131 bir fark\u0131ndal\u0131k gerektirir. Etkili bir \u015fekilde olu\u015fturulmu\u015f ve kurulmu\u015f bir <b>a\u011f sald\u0131r\u0131 tespit ve \u00f6nleme sistemi<\/b><span style=\"font-weight: 400;\">, hassas verileri \u00e7almaya, veri ihlallerine neden olmaya ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fcklemeye \u00e7al\u0131\u015fan davetsiz misafirlerin belirlenmesine yard\u0131mc\u0131 olabilir.<\/span><\/span><\/p>\n<h2 id=\"ips-nedir\">IPS Nedir?<\/h2>\n<p><span style=\"font-weight: 400;\">IPS, bir IDS ile ayn\u0131 a\u011f trafi\u011fini izleme i\u015flevini yerine getiren, ancak \u015f\u00fcpheli veya k\u00f6t\u00fc niyetli trafi\u011fi de engelleme yetene\u011fine sahip bir siber g\u00fcvenlik arac\u0131d\u0131r. T\u0131pk\u0131 IDS&#8217;ye benzer \u015fekilde veri taban\u0131na kar\u015f\u0131 a\u011f trafi\u011fini kontrol ederek \u00e7al\u0131\u015f\u0131r. Ancak aradaki fark, IPS&#8217;ler \u015f\u00fcpheli veya k\u00f6t\u00fc ama\u00e7l\u0131 etkinlikleri engelleme yetene\u011fine sahipken, IDS&#8217;ler yaln\u0131zca bu t\u00fcr etkinlikleri tan\u0131mlama ve g\u00fcnl\u00fc\u011fe kaydetme yetene\u011fine sahiptir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">G\u00fcvenlik duvarlar\u0131 gibi, IPS&#8217;ler de i\u015fletmenizin dahili a\u011f\u0131 ile internet aras\u0131nda bir engel g\u00f6revi g\u00f6r\u00fcr. \u0130ster bir e-posta eki indiriyor olun ister bir web sitesinde geziniyor olun, i\u015fletmenizin dahili a\u011f\u0131 internetten gelen harici trafi\u011fe maruz kal\u0131r. Bir IPS ile i\u015fletmenizin a\u011f\u0131n\u0131n d\u0131\u015f tehditlere kar\u015f\u0131 g\u00fcvende oldu\u011fundan emin olabilirsiniz.<br \/>\n<span style=\"font-weight: 400;\">A\u015fa\u011f\u0131dakiler dahil olmak \u00fczere d\u00f6rt ana IPS t\u00fcr\u00fc vard\u0131r:<\/span><\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Network based (A\u011f tabanl\u0131)<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Wireless (Kablosuz)<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Network behavior analysis<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Host based<\/span><\/li>\n<\/ul>\n<h2 id=\"ips-nasil-calisir\">IPS Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n<p><span style=\"font-weight: 400;\">\u00c7o\u011fu IPS \u00e7\u00f6z\u00fcm\u00fc g\u00fcvenlik duvar\u0131n\u0131n arkas\u0131nda bulunur, ancak bir t\u00fcr IPS olan HIPS (Host based IPS) u\u00e7 noktalarda bulunur. IPS mekanizmas\u0131 a\u015fa\u011f\u0131daki gibi \u00e7al\u0131\u015f\u0131r.<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">A\u011f trafi\u011fini tarar ve analiz eder ve paket ak\u0131\u015flar\u0131n\u0131 izler.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">\u015e\u00fcpheli etkinlikleri alg\u0131lar.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">BT ekiplerine alarm g\u00f6nderir.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">K\u00f6t\u00fc ama\u00e7l\u0131 paketleri b\u0131rak\u0131r.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Trafi\u011fi engeller.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Ba\u011flant\u0131lar\u0131 s\u0131f\u0131rlar.<\/span><\/li>\n<\/ul>\n<h2 id=\"ips-turleri-nelerdir\">IPS T\u00fcrleri Nelerdir?<\/h2>\n<p><span style=\"font-weight: 400;\">IPS, a\u011f paketlerini tarayarak yaln\u0131zca k\u00f6t\u00fc ama\u00e7l\u0131 etkinlikleri alg\u0131lamakla kalmaz, ayn\u0131 zamanda bunlar\u0131 \u00f6nler. A\u015fa\u011f\u0131da, i\u015flevlerine g\u00f6re IPS t\u00fcrlerini bulabilirsiniz:<\/span><\/p>\n<h3 id=\"1-host-based-ips\">1. Host-Based IPS<\/h3>\n<p><span style=\"font-weight: 400;\">Ana bilgisayar tabanl\u0131 IPS, tek bir ana bilgisayar \u00fczerinde \u00e7al\u0131\u015f\u0131r ve dahili a\u011fda k\u00f6t\u00fc ama\u00e7l\u0131 etkinliklerin olmamas\u0131n\u0131 sa\u011flar. Anormal imzal\u0131 herhangi bir etkinlik bulunursa, ana bilgisayar tabanl\u0131 IPS bunu alg\u0131lar.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ayr\u0131ca, bu etkinlikle ilgili daha fazla ayr\u0131nt\u0131 almak i\u00e7in a\u011f\u0131 tarar. Bu IPS, t\u00fcm a\u011fda \u00e7al\u0131\u015fmaz ve da\u011f\u0131t\u0131ld\u0131\u011f\u0131 tek bir ana bilgisayarda \u00e7al\u0131\u015f\u0131r.<\/span><\/p>\n<h3 id=\"2-wireless-ips\">2. Wireless IPS<\/h3>\n<p><span style=\"font-weight: 400;\">Bu t\u00fcr IPS kablosuz a\u011fda \u00e7al\u0131\u015f\u0131r. Kablosuz a\u011f\u0131 izler ve orada olan t\u00fcm etkinlikleri kontrol eder.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">K\u00f6t\u00fc ama\u00e7l\u0131 bir imzaya sahip bir etkinlik bulunursa, a\u011fa girmesini engeller. Ba\u011flant\u0131lar\u0131n \u00e7o\u011fu art\u0131k kablosuz oldu\u011fundan, bu g\u00fcnlerde en yayg\u0131n kullan\u0131lan IPS budur.<\/span><\/p>\n<h3 id=\"3-network-based-ips\">3. Network-based IPS<\/h3>\n<p><span style=\"font-weight: 400;\">K\u00f6t\u00fc niyetli faaliyetleri \u00f6nlemek i\u00e7in a\u011f \u00fczerinde konu\u015fland\u0131r\u0131l\u0131r. A\u011f tabanl\u0131 IPS t\u00fcm a\u011f\u0131 izler.<\/span><\/p>\n<h3 id=\"4-network-behavior-analysis\">4. Network Behavior Analysis<\/h3>\n<p><span style=\"font-weight: 400;\">A\u011f davran\u0131\u015f\u0131n\u0131 ve a\u011fda devam eden faaliyetleri anlar. K\u00f6t\u00fc niyetli paketleri alg\u0131layarak a\u011fa zarar vermemek i\u00e7in bu paketleri bloke eder. Sizi Dos ve di\u011fer gizlilik ihlali sald\u0131r\u0131lar\u0131ndan korur.<\/span><\/p>\n<h2 id=\"ips-kotu-amacli-faaliyetleri-nasil-tespit-eder\">IPS K\u00f6t\u00fc Ama\u00e7l\u0131 Faaliyetleri Nas\u0131l Tespit Eder?<\/h2>\n<p><span style=\"font-weight: 400;\">IPS&#8217;nin siber sald\u0131r\u0131lar\u0131 do\u011fru bir \u015fekilde tespit etmek i\u00e7in uygulayabilece\u011fi iki y\u00f6ntem vard\u0131r:<\/span><\/p>\n<h3 id=\"1-imzaya-dayali-tespit-signature-based-detection\">1. \u0130mzaya Dayal\u0131 Tespit (Signature-based Detection)<\/h3>\n<p><span style=\"font-weight: 400;\">IPS, paket ak\u0131\u015flar\u0131n\u0131 bir CVE s\u00f6zl\u00fc\u011f\u00fc ve bilinen kal\u0131plarla kar\u015f\u0131la\u015ft\u0131r\u0131r. Bir model e\u015fle\u015fmesi oldu\u011funda, IPS paketleri otomatik olarak uyar\u0131r ve engeller. S\u00f6zl\u00fck, belirli a\u00e7\u0131klardan yararlanma kal\u0131plar\u0131n\u0131 veya bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n varyantlar\u0131n\u0131n e\u011fitimli tahminlerini i\u00e7erebilir.<\/span><\/p>\n<h3 id=\"2-anomaliye-dayali-tespit-anomaly-based-detection\">2. Anomaliye Dayal\u0131 Tespit (Anomaly-based Detection)<\/h3>\n<p><span style=\"font-weight: 400;\">IPS, olas\u0131 tehditleri bilinen ve onaylanm\u0131\u015f bir temel seviyeyle kar\u015f\u0131la\u015ft\u0131rarak ve anormallik durumunda uyar\u0131 vererek belirlemek i\u00e7in bulu\u015fsal y\u00f6ntemler kullan\u0131r.<\/span><\/p>\n<h2 id=\"ips-gereksinimleri\">IPS Gereksinimleri<\/h2>\n<p><span style=\"font-weight: 400;\">IPS&#8217;nin a\u015fa\u011f\u0131dakileri sa\u011flamas\u0131 gerekir:<\/span><\/p>\n<p><b>Performans<\/b><span style=\"font-weight: 400;\">: A\u011f verimlili\u011fini sa\u011flamak i\u00e7in,<\/span><\/p>\n<p><b>H\u0131z:<\/b><span style=\"font-weight: 400;\"> \u0130stismarlar\u0131 ger\u00e7ek zamanl\u0131 olarak belirlemek i\u00e7in,<\/span><\/p>\n<p><b>Do\u011fruluk:<\/b><span style=\"font-weight: 400;\"> Do\u011fru tehditleri yakalamak ve yanl\u0131\u015flardan ka\u00e7\u0131nmak i\u00e7in.<\/span><\/p>\n<p>Bulutistan IPS hizmetinin detaylar\u0131na ula\u015fmak i\u00e7in <a href=\"https:\/\/bulutistan.com\/ips\/\" target=\"_blank\" rel=\"noopener\">t\u0131klay\u0131n\u0131z<\/a>.<\/p>\n<h2 id=\"ids-nedir\">IDS Nedir?<\/h2>\n<p><span style=\"font-weight: 400;\">IDS, bir a\u011fdaki trafi\u011fi \u015f\u00fcpheli etkinlik belirtileri a\u00e7\u0131s\u0131ndan izleyen, yaz\u0131l\u0131m veya donan\u0131m tabanl\u0131 bir siber g\u00fcvenlik arac\u0131d\u0131r. Da\u011f\u0131t\u0131ld\u0131\u011f\u0131nda, bir siber sald\u0131r\u0131 belirtisi ararken i\u015fletmenizin a\u011f\u0131ndaki trafi\u011fi s\u00fcrekli olarak tarar. IDS, potansiyel siber tehditleri aramak i\u00e7in a\u011f trafi\u011fini izler.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">IDS&#8217;ler, a\u011f trafi\u011fini bilinen siber tehditlerden olu\u015fan bir veri taban\u0131na \u00e7apraz referans vererek \u00e7al\u0131\u015f\u0131r. IDS, i\u015fletmenizin a\u011f\u0131nda bir siber tehdit tespit ederse, daha fazla ara\u015ft\u0131rma yapabilmeniz veya uygun ad\u0131mlar\u0131 atabilmeniz i\u00e7in olay\u0131 g\u00fcnl\u00fc\u011fe kaydeder.<\/span><\/p>\n<h2 id=\"ids-nasil-calisir\">IDS Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n<p><span style=\"font-weight: 400;\">Bir IDS, bir a\u011fdaki t\u00fcm cihazlardan gelen ve giden trafi\u011fi izler. Sistem, k\u00f6t\u00fc ama\u00e7l\u0131 paketler i\u00e7in ikincil bir filtre olarak bir g\u00fcvenlik duvar\u0131n\u0131n arkas\u0131nda \u00e7al\u0131\u015f\u0131r ve \u00f6ncelikle iki \u015f\u00fcpheli ipucu arar:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Bilinen sald\u0131r\u0131lar\u0131n imzalar\u0131.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">D\u00fczenli aktiviteden sapmalar.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Bir sald\u0131r\u0131 tespit sistemi, tehditleri belirlemek i\u00e7in tipik olarak model korelasyonuna dayan\u0131r. Bu y\u00f6ntem, bir IDS&#8217;nin a\u011f paketlerini bilinen siber sald\u0131r\u0131lar\u0131n imzalar\u0131n\u0131 i\u00e7eren bir veri taban\u0131yla kar\u015f\u0131la\u015ft\u0131rmas\u0131n\u0131 sa\u011flar. Bir IDS&#8217;nin model korelasyonuyla i\u015faretleyebilece\u011fi en yayg\u0131n sald\u0131r\u0131lar a\u015fa\u011f\u0131daki gibidir:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar (worms, fidye yaz\u0131l\u0131mlar\u0131, truva atlar\u0131, vir\u00fcsler, botlar vb.).<\/span><\/li>\n<li><span style=\"font-weight: 400;\">A\u00e7\u0131k veya kapal\u0131 ba\u011flant\u0131 noktalar\u0131, izin verilen trafik t\u00fcrleri, etkin ana bilgisayarlar ve yaz\u0131l\u0131m s\u00fcr\u00fcmleri hakk\u0131nda bilgi toplamak i\u00e7in a\u011fa paket g\u00f6nderen tarama sald\u0131r\u0131lar\u0131.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">K\u00f6t\u00fc ama\u00e7l\u0131 bir paket g\u00f6nderen ve farkl\u0131 giri\u015f ve \u00e7\u0131k\u0131\u015f yollar\u0131 ile g\u00fcvenlik kontrollerini atlayan asimetrik y\u00f6nlendirme.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Veri taban\u0131 i\u00e7eri\u011fini k\u00f6t\u00fc ama\u00e7l\u0131 y\u00fcr\u00fct\u00fclebilir dosyalarla de\u011fi\u015ftiren arabellek ta\u015fmas\u0131 sald\u0131r\u0131lar\u0131.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Belirli bir protokol\u00fc (ICMP, TCP, ARP, vb.) hedefleyen protokole \u00f6zg\u00fc sald\u0131r\u0131lar.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">DDoS sald\u0131r\u0131s\u0131 gibi a\u011f\u0131 a\u015f\u0131r\u0131 y\u00fckleyen trafik ta\u015fmas\u0131 ihlalleri.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Bir IDS bir anormallik ke\u015ffetti\u011finde, sistem sorunu i\u015faretler ve alarm verir. Uyar\u0131, bir denetim g\u00fcnl\u00fc\u011f\u00fcndeki basit bir nottan bir BT y\u00f6neticisine g\u00f6nderilen acil bir mesaja kadar de\u011fi\u015febilir. Ekip daha sonra sorunu giderir ve sorunun temel nedeni belirler.<\/span><\/p>\n<h2 id=\"ids-turleri-nelerdir\">IDS T\u00fcrleri Nelerdir?<\/h2>\n<p><span style=\"font-weight: 400;\">A\u015fa\u011f\u0131dakiler, d\u00f6rt ana IDS t\u00fcr\u00fcn\u00fc bulabilirsiniz:<\/span><\/p>\n<h3 id=\"1-network-ids-nids\">1. Network IDS (NIDS)<\/h3>\n<p><span style=\"font-weight: 400;\">Bu ba\u011f\u0131ms\u0131z yaz\u0131l\u0131m, a\u011f trafi\u011fini inceler, ana bilgisayarlar\u0131 izler ve ard\u0131ndan izinsiz giri\u015fleri tan\u0131mlar. NIDS, bir a\u011f anahtar\u0131na veya bir a\u011f hub&#8217;\u0131na ba\u011flan\u0131r ve ard\u0131ndan a\u011f trafi\u011fine eri\u015fim kazan\u0131r.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Trafi\u011fi izlemek i\u00e7in a\u011f\u0131n t\u0131kanma noktas\u0131na yerle\u015ftirilmi\u015f sens\u00f6rler bulunur. Bu sens\u00f6rler, herhangi bir k\u00f6t\u00fc ama\u00e7l\u0131 trafik i\u00e7in a\u011f\u0131n tek tek paketlerini analiz eder.<\/span><\/p>\n<h3 id=\"2-host-based-ids-hids\">2. Host-based IDS (HIDS)<\/h3>\n<p><span style=\"font-weight: 400;\">Burada ana bilgisayar, uygulama g\u00fcnl\u00fcklerini, sistem \u00e7a\u011fr\u0131lar\u0131n\u0131 ve ana bilgisayar\u0131n di\u011fer etkinliklerini izleyen ve izinsiz giri\u015fleri tan\u0131mlayan bir arac\u0131ya sahiptir. Bu IDS&#8217;deki sens\u00f6rlerin bir yaz\u0131l\u0131m arac\u0131s\u0131 vard\u0131r.<\/span><\/p>\n<h3 id=\"3-protocol-based-ids-pids\">3. Protocol-based IDS (PIDS)<\/h3>\n<p><span style=\"font-weight: 400;\">\u0130\u015fletmeler, sunucunun \u00f6n ucunda Protokol Tabanl\u0131 Sald\u0131r\u0131 Tespit Sistemi kurar. Sunucu ve kullan\u0131c\u0131 aras\u0131ndaki protokolleri yorumlar. PIDS, web\u2019in g\u00fcvenli\u011fini sa\u011flamak i\u00e7in HTTPS sunucusunu d\u00fczenli olarak izler. Benzer \u015fekilde, protokolle ilgili HTTP sunucusuna izin verir.<\/span><\/p>\n<h3 id=\"4-vm-based-ids-vmids\">4. VM Based IDS (VMIDS)<\/h3>\n<p><span style=\"font-weight: 400;\">Sanal bir makine kullanarak izleme sa\u011flar. T\u00fcm aktiviteleri izleyebildi\u011fi i\u00e7in kullan\u0131rken ayr\u0131 bir IDS&#8217;ye ihtiyac\u0131n\u0131z yoktur.<\/span><\/p>\n<h2 id=\"ips-vs-ids-farklar\"><b>IPS vs. IDS Farklar<\/b><\/h2>\n<p><b>IPS ve IDS aras\u0131ndaki temel fark<\/b><span style=\"font-weight: 400;\">, birinin izlemesi, di\u011ferinin kontrol etmesidir. IDS sistemleri paketleri de\u011fi\u015ftirmez. Sadece paketleri tarar ve bilinen tehditler veri taban\u0131yla kar\u015f\u0131la\u015ft\u0131r\u0131r. IPS sistemleri ise, paketin a\u011fa girmesini engeller.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>IPS ve IDS aras\u0131ndaki farklar\u0131<\/strong> detayl\u0131ca a\u015fa\u011f\u0131daki tabloda g\u00f6rebilirsiniz:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Kar\u015f\u0131la\u015ft\u0131rma Parametreleri<\/b><\/td>\n<td><b>IDS<\/b><\/td>\n<td><b>IPS<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Full &#8211; Form<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Sald\u0131r\u0131 Tespit Sistemleri<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Sald\u0131r\u0131 \u00d6nleme Sistemleri<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Piyasaya S\u00fcr\u00fclme<\/b><\/td>\n<td><span style=\"font-weight: 400;\">IDS, 1984 ile 1986 aras\u0131nda piyasaya s\u00fcr\u00fcld\u00fc.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">IPS 2000&#8217;lerin ortalar\u0131nda piyasaya s\u00fcr\u00fcld\u00fc.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Tan\u0131m<\/b><\/td>\n<td><span style=\"font-weight: 400;\">IDS, herhangi bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m i\u00e7in a\u011f ge\u00e7idinden ge\u00e7en dosyalar\u0131 alg\u0131layan sistemdir.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">IPS, sa\u011flanan kural k\u00fcmesine g\u00f6re alg\u0131lanan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 alg\u0131layan ve hatta \u00e7\u00f6zen yaz\u0131l\u0131md\u0131r.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>T\u00fcr<\/b><\/td>\n<td><span style=\"font-weight: 400;\">IDS, pasif bir yaz\u0131l\u0131m t\u00fcr\u00fcd\u00fcr.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">IPS aktif bir yaz\u0131l\u0131md\u0131r.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>\u00c7al\u0131\u015fma<\/b><\/td>\n<td><span style=\"font-weight: 400;\">IDS, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ve hatalar\u0131n alg\u0131lanmas\u0131n\u0131 ve bildirilmesini i\u00e7erir.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">IPS, sorunu kendi ba\u015f\u0131na \u00e7\u00f6zd\u00fc\u011f\u00fc i\u00e7in insanlar\u0131n veya di\u011fer yaz\u0131l\u0131mlar\u0131n kat\u0131l\u0131m\u0131n\u0131 gerektirmez.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Performans<\/b><\/td>\n<td><span style=\"font-weight: 400;\">IDS, \u00e7evrimi\u00e7i olmayan da\u011f\u0131t\u0131m nedeniyle a\u011f performans\u0131n\u0131 etkilemez.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">IPS, alg\u0131lama i\u015flemi nedeniyle a\u011f\u0131 yava\u015flat\u0131r.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>\u0130leti\u015fim<\/b><\/td>\n<td><span style=\"font-weight: 400;\">IDS&#8217;nin ileti\u015fimi bant d\u0131\u015f\u0131ndad\u0131r.\u00a0<\/span><\/td>\n<td><span style=\"font-weight: 400;\">IPS veri ileti\u015fimi ile uyumludur.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Avantaj<\/b><\/td>\n<td><span style=\"font-weight: 400;\">IDS, k\u00f6t\u00fc niyetli trafi\u011fi alg\u0131lar.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">IPS k\u00f6t\u00fc niyetli trafi\u011fi d\u00fc\u015f\u00fcr\u00fcr, uyar\u0131r veya temizler.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"ids-vs-ips-vs-guvenlik-duvari\">IDS vs. IPS vs. G\u00fcvenlik Duvar\u0131<\/h2>\n<p><span style=\"font-weight: 400;\">Bu 3 kavram, bir a\u011f\u0131n olduk\u00e7a \u00f6nemli bile\u015fenleridir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Trafik filtreleme ve engelleme gibi eylemler ger\u00e7ekle\u015ftiren farkl\u0131 g\u00fcvenlik duvar\u0131 t\u00fcrleri vard\u0131r.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00d6te yandan, IDS k\u00f6t\u00fc ama\u00e7l\u0131 etkinlikleri alg\u0131larken, IPS yap\u0131land\u0131rmaya g\u00f6re k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 alg\u0131lar ve \u00f6nler.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">G\u00fcvenlik duvar\u0131 kullan\u0131rken ise, baz\u0131 kurallar\u0131 yap\u0131land\u0131rman\u0131z gerekir ve bunlara g\u00f6re; trafi\u011fin ge\u00e7mesine izin verir. Yap\u0131land\u0131r\u0131lan kurallara uymayan trafi\u011fin ge\u00e7mesine izin verilmez.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">G\u00fcvenlik duvar\u0131, ba\u011flant\u0131 noktalar\u0131na, kaynak ve hedef adreslere ba\u011fl\u0131d\u0131r.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">IDS, veri paketlerini izleyen ve bunlar\u0131 bir imzayla kar\u015f\u0131la\u015ft\u0131ran, ard\u0131ndan herhangi bir \u015f\u00fcpheli etkinlik konusunda uyar\u0131 veren pasif bir cihaz olarak \u00e7al\u0131\u015f\u0131r.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">IPS, sat\u0131r i\u00e7i modda \u00e7al\u0131\u015f\u0131r ve sald\u0131r\u0131y\u0131 \u00f6nlemek i\u00e7in imza modellerini kar\u015f\u0131lamayan veri paketlerini engeller.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">G\u00fcvenlik duvar\u0131, trafi\u011fi ba\u011flant\u0131 noktas\u0131 numaras\u0131na ve IP adresine g\u00f6re filtrelerken, IDS ve IPS ger\u00e7ek zamanl\u0131 trafi\u011fi inceler ve trafik modellerini arar.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Basit bir deyi\u015fle, g\u00fcvenlik duvar\u0131 trafik modellerini analiz etmez. \u0130lk savunma hatt\u0131d\u0131r. IDS ve IPS, g\u00fcvenlik duvar\u0131ndan sonraki yerlerdir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00d6zetle diyebiliriz ki, IDS ve IPS&#8217;ler, i\u015fletmenizi siber tehditlerden koruyabilen iki yayg\u0131n siber g\u00fcvenlik arac\u0131d\u0131r. Her ikisi de bilinen siber tehditler veri taban\u0131na kar\u015f\u0131 a\u011f trafi\u011fini kontrol ederek \u00e7al\u0131\u015f\u0131r. Bununla birlikte, yaln\u0131zca IPS&#8217;ler siber tehditleri engelleyebilir. IDS&#8217;ler yaln\u0131zca siber tehditleri belirlemek i\u00e7in tasarlan\u0131rken, IPS&#8217;ler siber tehditleri hem belirlemek hem de engellemek i\u00e7in tasarlanm\u0131\u015ft\u0131r. Bu ince n\u00fcans d\u0131\u015f\u0131nda, hemen hemen ayn\u0131d\u0131rlar.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"Intrusion Detection System (IDS) ve Intrusion Prevention System (IPS) terimlerini duydu\u011funuzda, her ikisinin de ayn\u0131 t\u00fcr izinsiz giri\u015fi&hellip;\n","protected":false},"author":1,"featured_media":3022,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0},"categories":[11],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IPS Nedir? IPS vs. IDS Farklar\u0131 - Bulutistan Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bulutistan.com\/blog\/ips-nedir\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPS Nedir? IPS vs. IDS Farklar\u0131 - Bulutistan Blog\" \/>\n<meta property=\"og:description\" content=\"Intrusion Detection System (IDS) ve Intrusion Prevention System (IPS) terimlerini duydu\u011funuzda, her ikisinin de ayn\u0131 t\u00fcr izinsiz giri\u015fi&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bulutistan.com\/blog\/ips-nedir\/\" \/>\n<meta property=\"og:site_name\" content=\"Bulutistan Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-03T19:03:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-08T18:34:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2022\/03\/IPS-Nedir-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1439\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bulutistan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bulutistan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bulutistan.com\/blog\/ips-nedir\/\",\"url\":\"https:\/\/bulutistan.com\/blog\/ips-nedir\/\",\"name\":\"IPS Nedir? IPS vs. IDS Farklar\u0131 - Bulutistan Blog\",\"isPartOf\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\"},\"datePublished\":\"2022-03-03T19:03:03+00:00\",\"dateModified\":\"2023-09-08T18:34:06+00:00\",\"author\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bulutistan.com\/blog\/ips-nedir\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\",\"url\":\"https:\/\/bulutistan.com\/blog\/\",\"name\":\"Bulutistan Blog\",\"description\":\"Teknolojide Yol Arkada\u015f\u0131n\u0131z\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bulutistan.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\",\"name\":\"Bulutistan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"caption\":\"Bulutistan\"},\"sameAs\":[\"https:\/\/bulutistan.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IPS Nedir? IPS vs. IDS Farklar\u0131 - Bulutistan Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bulutistan.com\/blog\/ips-nedir\/","og_locale":"tr_TR","og_type":"article","og_title":"IPS Nedir? IPS vs. IDS Farklar\u0131 - Bulutistan Blog","og_description":"Intrusion Detection System (IDS) ve Intrusion Prevention System (IPS) terimlerini duydu\u011funuzda, her ikisinin de ayn\u0131 t\u00fcr izinsiz giri\u015fi&hellip;","og_url":"https:\/\/bulutistan.com\/blog\/ips-nedir\/","og_site_name":"Bulutistan Blog","article_published_time":"2022-03-03T19:03:03+00:00","article_modified_time":"2023-09-08T18:34:06+00:00","og_image":[{"width":2560,"height":1439,"url":"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2022\/03\/IPS-Nedir-scaled.jpg","type":"image\/jpeg"}],"author":"Bulutistan","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Bulutistan","Tahmini okuma s\u00fcresi":"9 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bulutistan.com\/blog\/ips-nedir\/","url":"https:\/\/bulutistan.com\/blog\/ips-nedir\/","name":"IPS Nedir? IPS vs. IDS Farklar\u0131 - Bulutistan Blog","isPartOf":{"@id":"https:\/\/bulutistan.com\/blog\/#website"},"datePublished":"2022-03-03T19:03:03+00:00","dateModified":"2023-09-08T18:34:06+00:00","author":{"@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bulutistan.com\/blog\/ips-nedir\/"]}]},{"@type":"WebSite","@id":"https:\/\/bulutistan.com\/blog\/#website","url":"https:\/\/bulutistan.com\/blog\/","name":"Bulutistan Blog","description":"Teknolojide Yol Arkada\u015f\u0131n\u0131z","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bulutistan.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Person","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e","name":"Bulutistan","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","caption":"Bulutistan"},"sameAs":["https:\/\/bulutistan.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/2871"}],"collection":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/comments?post=2871"}],"version-history":[{"count":6,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/2871\/revisions"}],"predecessor-version":[{"id":3973,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/2871\/revisions\/3973"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media\/3022"}],"wp:attachment":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media?parent=2871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/categories?post=2871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/tags?post=2871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}