From the course: Cisco Network Security: Intrusion Detection and Prevention

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Anomaly-based IDS

Anomaly-based IDS - Cisco Routers Tutorial

From the course: Cisco Network Security: Intrusion Detection and Prevention

Start my 1-month free trial

Anomaly-based IDS

- [Instructor] Intrusion detection systems detect malicious activity by using either atomic or single-packet patterns or composite or multi-packet signature patterns. Once a specific signature is found, the device will send an atomic alert. I'm at this website Kaspersky Cyberthreat Real-Time Map, where we can see there is a constant barrage of attacks. We'll take a look around on this website and I'll scroll down, it will show most infected today and some historical statistics worldwide. Here we can see top local infections in the last week and some of the variants. To stop incoming malicious traffic, the network must first be able to identify it. There is a main disadvantage in pattern-based detection in that it cannot detect unknown attacks. While malware signatures are critical in monitoring the system, the one threat that will pose a significant risk to your organization is a zero-day attack. A zero-day attack exploits unknown software vulnerabilities. Here we see, in this…

Contents