SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Signature-Based or Anomaly-Based Intrusion Detection: The
Merits and Demerits
Whether you need to monitor your own network or Host by
connecting them to identify any latest threats, there are some great
open source intrusion detection systems (IDSs) one need to know.
So before coming over to the actual topic, let’s gain some
knowledge about what an IDS software is?
I won't bore you with the complete brief Blahh... Blahh.. IDS is.
It’s simply a security software which is termed to help user or
system administrator by automatically alert or notify at any case
when a user tries to compromise information system through any
malicious activities or at point where violation of security policies
is taken.
Network IDS - These Detection are operated by inspecting
traffic that occurs between hosts.
These mechanisms are basically prorated into two major forms.
1. IDS signature detection 2. Anomaly detection
1. IDS Signature Detection- This type of detection work well
with the threads that are already determined or known. It
implicates searching a series of bytes or sequence that are termed
to be malicious. One of the most profitable point is that signatures
are easy to apply and develop once you will figure out the sort of
network behaviour to be find out.
For example, you might use a signature that looks for particular
strings that detects attacks that are attempting to exploit a
particular system database. Therefore, at this instance the events
generated by a signature-based IDS can communicate what caused
the alert. Also, pattern matching can be performed very quickly on
modern systems so the amount of power needed to perform these
checks is minimal.
Disadvantages
1. Firstly, it's easy to fool signature-based solutions by changing
the ways in which an attack is made.
2. Secondly, the more advanced the IDS Signature database, the
higher the CPU load for the system charged with analysing each
signature
3. Novel attacks cannot be detected as the only execute for known
attacks
2. Anomaly detection- The anomaly detection technique is a
centralized process that works on the concept of a baseline for
network behaviour. This baseline is a description of accepted
network behaviour, which is learned or specified by the network
administrators, or both. It’s like a guard dog personally
interviewing everyone at the gate before they are let down the
drive.
Its integral part of baselining network is the capability of engine's
to dissect protocols at all layers. For every protocol that is being
monitored, the engine must possess the ability to decode and
process the protocol in order to understand its goal. and to carry
out IDS Update much batter way.
Disadvantages
1. One of the major drawbacks of anomaly-detection engines is
the difficultly of defining rules. Each protocol being analysed
must be defined, implemented and tested for accuracy which is not
always an easy task
2. Other of the perils including that if any malicious activity that
falls within normal usage patterns is not detected. An activity such
as directory traversal on a targeted server doesn't triggered out of
protocol, payload or bandwidth limitation flag if complies with
network protocol.
3. Anomaly testing requires more hardware as compared to the
IDS Signature method, that must be spread across the network.
Thus go well with only larger networks and, with high bandwidth
connections.
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits

More Related Content

PPT
intrusion detection system (IDS)
PPTX
Intrusion detection
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPTX
Network security
PPTX
Intrusion prevention system(ips)
PPT
Network Security
PPTX
Intrusion Detection Systems (IDS)
PPTX
Intrusion detection system
intrusion detection system (IDS)
Intrusion detection
Intrusion Detection Systems and Intrusion Prevention Systems
Network security
Intrusion prevention system(ips)
Network Security
Intrusion Detection Systems (IDS)
Intrusion detection system

What's hot (20)

PPTX
Intrusion Detection System(IDS)
PPT
Security Design Principles.ppt
PDF
Network Security Fundamentals
PPT
Intrusion detection system ppt
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PPTX
Intrusion detection system
PPTX
Intrusion detection system
PPTX
Windows firewall
PPTX
Firewalls
PPT
FireWall
PPT
Intrusion Detection System
PPTX
Network Security
PPTX
firewall and its types
PPT
Security Requirements in IoT Architecture
PPTX
Trojan virus & backdoors
PPTX
Firewall in Network Security
PPTX
Introduction to Snort
PPTX
Firewall & packet filter new
PPTX
Ethical Hacking & Penetration Testing
PPTX
Cyber kill chain
Intrusion Detection System(IDS)
Security Design Principles.ppt
Network Security Fundamentals
Intrusion detection system ppt
Computer Security and Intrusion Detection(IDS/IPS)
Intrusion detection system
Intrusion detection system
Windows firewall
Firewalls
FireWall
Intrusion Detection System
Network Security
firewall and its types
Security Requirements in IoT Architecture
Trojan virus & backdoors
Firewall in Network Security
Introduction to Snort
Firewall & packet filter new
Ethical Hacking & Penetration Testing
Cyber kill chain
Ad

Similar to Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits (20)

PPTX
Network Security - Intrusion Detection System.pptx
PDF
Detecting Anomaly IDS in Network using Bayesian Network
PPTX
(Group 2) intrusion detection system.pptx
PPT
AN INTRUSION DETECTION SYSTEM
PDF
A Survey On Intrusion Detection Systems
PDF
Intrusion_Detection_By_loay_elbasyouni
PDF
Chapter 3- Intrusion Detection.pdf
PPT
Intrusion Detection Systems
PDF
M0446772
PDF
Certified Secure - Ineffective Detection Systems
PDF
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
PDF
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
PPTX
Intrusion detection Techniques in cyber security
PPSX
Ids 00 introduction_ intrusion detection & prevention systems
PDF
Es34887891
PPT
PPT
arun.ppt
PPT
arun.ppt
PDF
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
PDF
IDS (intrusion detection system)
Network Security - Intrusion Detection System.pptx
Detecting Anomaly IDS in Network using Bayesian Network
(Group 2) intrusion detection system.pptx
AN INTRUSION DETECTION SYSTEM
A Survey On Intrusion Detection Systems
Intrusion_Detection_By_loay_elbasyouni
Chapter 3- Intrusion Detection.pdf
Intrusion Detection Systems
M0446772
Certified Secure - Ineffective Detection Systems
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
Intrusion detection Techniques in cyber security
Ids 00 introduction_ intrusion detection & prevention systems
Es34887891
arun.ppt
arun.ppt
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
IDS (intrusion detection system)
Ad

More from david rom (7)

PPTX
Signs and Symptoms of Recurrent Respiratory Papillomatosis
PPTX
Unlocking the Mystery: Understanding TMJ Disorders
PPTX
Security Benefits of Firewall Protection
PPTX
Why do People Prefer Using Open Source Software?
PPTX
A Guide on Top Linux Distribution in 2016
PPTX
The Perfect Linux Security Firewalls
PPTX
Five Major Types of Intrusion Detection System (IDS)
Signs and Symptoms of Recurrent Respiratory Papillomatosis
Unlocking the Mystery: Understanding TMJ Disorders
Security Benefits of Firewall Protection
Why do People Prefer Using Open Source Software?
A Guide on Top Linux Distribution in 2016
The Perfect Linux Security Firewalls
Five Major Types of Intrusion Detection System (IDS)

Recently uploaded (20)

PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Getting Started with Data Integration: FME Form 101
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Modernising the Digital Integration Hub
PPTX
Tartificialntelligence_presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
project resource management chapter-09.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Getting Started with Data Integration: FME Form 101
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
O2C Customer Invoices to Receipt V15A.pptx
Module 1.ppt Iot fundamentals and Architecture
Developing a website for English-speaking practice to English as a foreign la...
WOOl fibre morphology and structure.pdf for textiles
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Enhancing emotion recognition model for a student engagement use case through...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Modernising the Digital Integration Hub
Tartificialntelligence_presentation.pptx
NewMind AI Weekly Chronicles - August'25-Week II
OMC Textile Division Presentation 2021.pptx
Getting started with AI Agents and Multi-Agent Systems
Assigned Numbers - 2025 - Bluetooth® Document
project resource management chapter-09.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
1 - Historical Antecedents, Social Consideration.pdf

Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits

  • 1. Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits Whether you need to monitor your own network or Host by connecting them to identify any latest threats, there are some great open source intrusion detection systems (IDSs) one need to know. So before coming over to the actual topic, let’s gain some knowledge about what an IDS software is? I won't bore you with the complete brief Blahh... Blahh.. IDS is. It’s simply a security software which is termed to help user or system administrator by automatically alert or notify at any case when a user tries to compromise information system through any malicious activities or at point where violation of security policies is taken.
  • 2. Network IDS - These Detection are operated by inspecting traffic that occurs between hosts. These mechanisms are basically prorated into two major forms. 1. IDS signature detection 2. Anomaly detection 1. IDS Signature Detection- This type of detection work well with the threads that are already determined or known. It implicates searching a series of bytes or sequence that are termed to be malicious. One of the most profitable point is that signatures are easy to apply and develop once you will figure out the sort of network behaviour to be find out. For example, you might use a signature that looks for particular strings that detects attacks that are attempting to exploit a particular system database. Therefore, at this instance the events
  • 3. generated by a signature-based IDS can communicate what caused the alert. Also, pattern matching can be performed very quickly on modern systems so the amount of power needed to perform these checks is minimal. Disadvantages 1. Firstly, it's easy to fool signature-based solutions by changing the ways in which an attack is made. 2. Secondly, the more advanced the IDS Signature database, the higher the CPU load for the system charged with analysing each signature 3. Novel attacks cannot be detected as the only execute for known attacks 2. Anomaly detection- The anomaly detection technique is a centralized process that works on the concept of a baseline for network behaviour. This baseline is a description of accepted network behaviour, which is learned or specified by the network administrators, or both. It’s like a guard dog personally interviewing everyone at the gate before they are let down the drive. Its integral part of baselining network is the capability of engine's to dissect protocols at all layers. For every protocol that is being monitored, the engine must possess the ability to decode and process the protocol in order to understand its goal. and to carry out IDS Update much batter way.
  • 4. Disadvantages 1. One of the major drawbacks of anomaly-detection engines is the difficultly of defining rules. Each protocol being analysed must be defined, implemented and tested for accuracy which is not always an easy task 2. Other of the perils including that if any malicious activity that falls within normal usage patterns is not detected. An activity such as directory traversal on a targeted server doesn't triggered out of protocol, payload or bandwidth limitation flag if complies with network protocol. 3. Anomaly testing requires more hardware as compared to the IDS Signature method, that must be spread across the network. Thus go well with only larger networks and, with high bandwidth connections.