Unit 5 IDS
Unit 5 IDS
• Signature-based Method:
Signature-based IDS detects the attacks on the basis of the
specific patterns such as number of bytes or number of 1’s
or number of 0’s in the network traffic.
• It also detects on the basis of the already known malicious
instruction sequence that is used by the malware.
• The detected patterns in the IDS are known as
signatures.Signature-based IDS can easily detect the attacks
whose pattern (signature) already exists in system but it is
quite difficult to detect the new malware attacks as their
pattern (signature) is not known.
Anomaly-based Method:
• Anomaly-based IDS was introduced to detect the unknown
malware attacks as new malware are developed rapidly.
• In anomaly-based IDS there is use of machine learning to
create a trustful activity model and anything coming is
compared with that model and it is declared suspicious if
it is not found in model.
• Machine learning based method has a better generalized
property in comparison to signature-based IDS as these
models can be trained according to the applications and
hardware configurations.