Broadly speaking, there are two distinct types of intrusion detection systems, namely, signature-based and anomaly-based.
a. List the advantages of signature-based intrusion detection, as compared to anomaly-based intrusion detection.
b. List the advantages of an anomaly-based IDS, in contrast to a signature-based IDS.
c. Why is effective anomaly-based IDS inherently more challenging than signature-based detection?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here