Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Intrusion Detection and Prevention Tools Fight Ransomware
Cybersecurity

How Intrusion Detection and Prevention Tools Fight Ransomware

Robert WoodBy Robert WoodApril 1, 2022Updated:April 13, 20234 Mins Read
Facebook Twitter LinkedIn Email
IDS and IPS - Intrusion Detection and Prevention
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Intrusion detection and prevention systems (IDS and IPS, respectively) have been around in cybersecurity for years. These technologies are essential parts of a layered defense strategy. The way they typically work is by monitoring network traffic patterns and alerting on or blocking traffic that conforms to signature-based patterns. Ransomware, much like other forms of malware can be tackled through a layered defense strategy that includes IDS and IPS technologies.

What’s Old is New Again

Malware techniques to move across an environment are also in place with most, if not all ransomware strains as ransomware operates as a subset of malware. Additionally, with the emergence of ransomware as an attack pattern, traditional malware does not and likely will not go away. It will continue to evolve in its own way, with those advancements impacting and advancing ransomware.

One key consideration in the ransomware context is how IDS/IPS technologies are deployed around backup or recovery solutions. Recovery from a ransomware attack is made much easier when data can be recovered without the key used to encrypt the data in the first place. Having added layers of protection around backup solutions that block as well as alert for potentially malicious attempts at access are incredibly important.

Deception Integration

Deception-based technologies have come a long way since the introduction of basic network-based honeypots or host emulation. Platforms exist today to deploy decoys of different types and correlate the interaction with them back into centralized security tooling. Decoy types vary widely, such as: credentials or tokens, files on disk, configuration settings, entire systems, web pages or URLs within a web application, and more.

In that context, deploying decoys that are specifically aimed at devices and networks can be particularly effective. On a device, this might look like decoy files or configuration settings that when tripped, set off an alarm. On a network, this might look more like a traditional honeypot device with intentionally exposed network services, insecure credentials, etc.

Deception platforms also enable security teams to deploy a whole suite of decoys. They can be layered together in an environment at different degrees of sophistication. This approach, when combined with IDS/IPS technologies is a powerful tool to detect active threats within an environment. The alert triggers associated with this approach have a higher confidence level, helping the responders properly prioritize and react.

Integration with Other Security Technologies

None of these solutions, whether SOAR, deception, or IDS/IPS tools will be effective if they work alone. Seeking out and deploying solutions that can be integrated with one another is essential to success today. Some organizations have also built specific integrations to support the fight against ransomware, for example, Acalvio and Crowdstrike can work together to deploy decoys to devices and if triggered, can quickly operationalize indicators of compromise (IOCs) to protect an environment.

An effective but commonly discussed area of collaboration is around threat intelligence teams and IDS/IPS deployments. This approach takes IOCs from outside the organization and feeds them into security systems to aid detection within the organization. Something not discussed frequently is the approaches and tactics used by penetration testing teams to enrich IDS/IPS deployments. Taking a purple team style approach where the techniques and patterns used by testers are fed back into IDS/IPS deployments adds a level of context that typical threat intelligence does not.

Concluding Thoughts

Integrations are essential in this rapidly evolving world of technology and cybersecurity. Traditional solutions like IDS and IPS have the potential to evolve alongside and support emerging solutions, as well as be enriched by them. One of the challenges we have in this field is that the old never really go away when the new comes. Our spectrum of responsibility simply grows to demand focus on both, the new eventually becomes old and so the cycle repeats.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity channel featured IDS IPS Ransomware
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

PwC Updates AI Agent Orchestrator With Support for AWS-Native Services

July 25, 2025

SAP Q2 Results: The Good News, and the Not-As-Good News

July 24, 2025

SAP Still #1 in Apps Growth, but Big Backlog Slowdown

July 24, 2025

U.K. Government Partners with Google Cloud to Modernize Infrastructure and Upskill 100,000 Workers

July 23, 2025
Add A Comment

Comments are closed.

Recent Posts
  • PwC Updates AI Agent Orchestrator With Support for AWS-Native Services
  • SAP Q2 Results: The Good News, and the Not-As-Good News
  • SAP Still #1 in Apps Growth, but Big Backlog Slowdown
  • U.K. Government Partners with Google Cloud to Modernize Infrastructure and Upskill 100,000 Workers
  • Thailand Turns to Microsoft Azure AI for Legal System Overhaul

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Special Report: Cloud Wars 2025 CEO Outlook

February 12, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }