1. Sensors/Probes: These are the components of an IDS that monitor traffic and detect malicious activities. Examples include intrusion detection systems (IDS), network intrusion detection systems (NIDS), and host-based intrusion detection systems (HIDS).
2. Analysis Engine: This component of an IDS analyzes the data collected by sensors/probes and compares it to known malicious activities. Examples include rule-based analysis, signature-based analysis, and anomaly-based analysis.
3. Reporting and Alerting: This component of an IDS generates reports and alerts when malicious activities are detected. Examples include email alerts, SMS alerts, and system logs.
4. Response and Recovery: This component of an IDS takes action when malicious activities are detected. Examples include blocking malicious traffic, disabling compromised accounts, and restoring data from backups.