Logo

Two primary threat detection techniques:

  1. Signature-based detection and
  2. Anomaly-based detection
  • Signature Based IDS:
    • Exists Rules or patterns of known malicious traffic being searched for.
    • Once a match to a signature is found, action can be taken. (ex:  malware, network scanning activity, and attacks against servers)
  • Anamoly Based IDS:
    • Relies on baselines rather than signatures.
    • Will search for unusual activity that deviates from statistical averages of previous activities

© 2025 All rights reservedBuilt with DataHub Cloud

Built with LogoDataHub Cloud