Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Indicator of Intrusion (IoI)

Posted on by

Indicator of Intrusion is the indicator that an intruder had gained or made attempts to gain un-authorized access to a system.

Types of Indicator of Intrusion

File System Intrusion

By observing and assessing files in the system, we can detect intrusion by the following ways:

  • There is an new unknown file.
  • Change in file persmission compared to earlier permissions.
  • Change in size of the file.
  • Change in the hash value of the file.
  • Missing file.
  • Change in the location of the file.
  • Change in the file type extension.

Network Intrusion Indicator

By monitoring the network activity, we can detect intrusion by the following ways:

  • Increase in volume of network traffic.
  • High volume of unidirectional network traffic.
  • High drops of packets in the firewall.
  • Network traffic from malicious IPs.

System Intrusion Indicator

By monitoring the system activity and logs, we can detect intrusion by the following ways:

  • Increase in CPU and Memory usage,
  • Abnormal and high failed login and un-successful attempts.
  • System low performance.
  • Unknown processes and services running.
  • System crash and reboots.

NIST – Intrusion – Glossary | CSRC

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme