Signature vs. Anomaly Based

Intrusions are detected based on two different approaches:

  • Signature;

  • Anomaly.

Signature

  • Monitored data compared to preconfigured and predetermined attack patterns known as signatures;

  • Attacks have distinctly known signatures;

  • Signatures must be constantly updated to mitigate emerging threats.

  • Signatures may contain:

    • Individual packet header values or binary data patterns,

    • A sequence of packets with specific characteristics within the same flow, or

    • Set of data flows (data stream) with specific characteristics (of flows or transmitted packets/data).

Anomaly

  • Establishes a behavior baseline (profile) and detected deviation from that profile;

  • May rely only on high-level systems or network statistics, or include multiple data sources;

  • May be based on predefined rules or on AI models.

Last updated