IDS and LucidView

In this modern world Security on your Internet resources is becoming more and more important. 

In today’s world, large enterprises, small to medium sized companies, schools and homes should be able to have both affordable and clean Internet. 

There is no longer any reason why anybody should have forgo the one in order to have the other.

Combining the LucidView Reporting Engine with the Lucidview Content Filter we can provide you with a very powerful and effective intrusion detection and prevention system.

We call this combination the LucidView Enforcer.

Comprehensive Detection and Protection

With LucidView Enforcer each and every connection that comes into or leaves your Network is analysed and categorised.  Equally as important, the Enforcer examines traffic patterns, looking for anything out of the ordinary.  Any traffic and/or connections behaving oddly are immediately added to the “Suspicious” category and blocked.

In other words, the LucidView Enforcer provides you or your client with an advanced intrusion detection and then prevent intrusion system.  The combination of these two solutions is a complete IDPS solution.

Thus, the LucidView MikroTik Enforcer can both identify intrusion attempts and put an end to them quickly. Providing you with Intrusion Prevention as well.

Reporting on Intrusion Attempts

Reports on intrusion attempts averted can be pulled Via the dashboard  data analysis tool, or scheduled reports can be sent out.

Intrusion Detection

The charts in this example provide an illustration of how the LucidView Enforcer examines and an analyses each connection coming into and leaving your network.

Using our own AI, the Enforcer effectively assesses, in real time, whether or not the connection is behaving “suspiciously”.  If it is, the Enforcer automatically puts that URL into the “suspect” category in our Content Filter.

Using the tools provided by our Content Filter, these connections are killed off upon identification.  Offering not only Intrusion Detection (IDS) but proactive protection (IDPS).

Intrusion Detection Dashboard
Overview of Intrusion Detection, attempts to access or plant malware on your network and Intrusion that was eliminated by the Enforcer

LucidView’s approach to IDS

The LucidView Enforcer has a two-fold approach to Intrusion Detection.  This includes, not simply identifying the intrusion attempt, but eliminating as soon as it is identified.

Traditional IDS

Traditional IDS solutions look for intrusion attempts by analysing traffic patterns and anomalies.  Once they have found a pattern that could represent malware based on its signature, administrators of the systems should be able to see and thus act on this information.

LucidView Enforcer’s Approach to IDS

LucidView’s approach differs in a few ways.  Firstly, we do the standard signature based identification that all IDS solutions typically do.  Over and above this, we assess each and every connection and watch how it behaves, where it comes from, how it got there.  Based on this, we define it as suspicious or safe in real time.

Furthermore, LucidView then eliminates all suspicious connections, traffic and anomalies.

The administrator or end-user, depending on how you choose to use the solution, receives a report on all potential malware and cyber threats that were killed off using the LucidView MikroTik Enforcer (or whatever you call your product).

In short, the LucidView MikroTik Enforcer offers both an Intrusion Detection Solution (IDS) combined with an Intrusion Prevention Solution (IDPS).

Common Cyber Threats we protect against

Securing your network from hackers, malware and ransomware.

The more dependent we become on the Internet, the more threats we are faced with.  

These threats are commonly known as:

  • Malwarenoun

software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.


  • Ransomwarenoun

noun: ransomware; noun: ransom-ware

a type of malicious software designed to block access to a computer system until a sum of money is paid.
“although ransomware is usually aimed at individuals, it’s only a matter of time before business is targeted as well”


  • Hackers


plural noun: hackers

  1. a person who uses computers to gain unauthorized access to data.
      an enthusiastic and skilful computer programmer or user.
  1. a person or thing that hacks or cuts roughly.


Definitions provided by