SlideShare a Scribd company logo
1 of 1
Download to read offline
Explain the advantages and disadvantages of misuse-based and anomaly-based intrusion
detection systems.
Solution
Misuse based IDS
Advantages
Misuse IDS provide better visibility of the over system from outside attacks.
Misuse has a greater capability of response to the outside attacks
Misuse also provide the tracking of virus propagation.
Disadvantages
Maintain is a difficult task of Misuse based IDS.
Misuse requires great amount of staff
Anomaly based IDS
Advantages
News threats can be detected without worrying about the signature which help to protect systems
from new threats.
This type of IDS requires very little maintenance once the system is deployed.
The third advantage is port scan that are conducted over large time frame can be detected.
Disadvantages
The system must learn and create profile for each user group which lead the system to be
unprotected state during learning phase.
If attack pretends the attack as normal traffic then this type of IDS would fail to protect the
system from outside attacks.
The main disadvantage is that this IDS will slows down the performance of overall system.

More Related Content

Similar to Explain the advantages and disadvantages of misuse-based and anomaly.pdf

A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesKelly Taylor
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIRJET Journal
 
Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detectionPiyu Karande
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetijctet
 
A STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONA STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONIAEME Publication
 
A STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONA STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONIAEME Publication
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detectioneditor1knowledgecuddle
 
Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIntrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIDES Editor
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...researchinventy
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networksijsrd.com
 
Intrusion detection system – a study
Intrusion detection system – a studyIntrusion detection system – a study
Intrusion detection system – a studyijsptm
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IJNSA Journal
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptxDrRajapraveen
 

Similar to Explain the advantages and disadvantages of misuse-based and anomaly.pdf (20)

A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
 
46 102-112
46 102-11246 102-112
46 102-112
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detection
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 
Intrusion .ppt
Intrusion .pptIntrusion .ppt
Intrusion .ppt
 
A STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONA STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTION
 
A STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONA STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTION
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIntrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction Technique
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networks
 
Intrusion detection system – a study
Intrusion detection system – a studyIntrusion detection system – a study
Intrusion detection system – a study
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Ids
IdsIds
Ids
 
Security raw
Security rawSecurity raw
Security raw
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptx
 

More from izabellejaeden956

E. coli takes up plasmid DNA by which of the following methodsple.pdf
E. coli takes up plasmid DNA by which of the following methodsple.pdfE. coli takes up plasmid DNA by which of the following methodsple.pdf
E. coli takes up plasmid DNA by which of the following methodsple.pdfizabellejaeden956
 
Consider the two genes described in Question 7. What is the probabili.pdf
Consider the two genes described in Question 7. What is the probabili.pdfConsider the two genes described in Question 7. What is the probabili.pdf
Consider the two genes described in Question 7. What is the probabili.pdfizabellejaeden956
 
A wireless technology that may someday replace barcodes through the u.pdf
A wireless technology that may someday replace barcodes through the u.pdfA wireless technology that may someday replace barcodes through the u.pdf
A wireless technology that may someday replace barcodes through the u.pdfizabellejaeden956
 
The director of special events for Sun City believed that he amount o.pdf
The director of special events for Sun City believed that he amount o.pdfThe director of special events for Sun City believed that he amount o.pdf
The director of special events for Sun City believed that he amount o.pdfizabellejaeden956
 
Write an application containing three parallel arrays that hold 10 e.pdf
Write an application containing three parallel arrays that hold 10 e.pdfWrite an application containing three parallel arrays that hold 10 e.pdf
Write an application containing three parallel arrays that hold 10 e.pdfizabellejaeden956
 
Which type of project risk is the most relevantStand-alone risk.pdf
Which type of project risk is the most relevantStand-alone risk.pdfWhich type of project risk is the most relevantStand-alone risk.pdf
Which type of project risk is the most relevantStand-alone risk.pdfizabellejaeden956
 
Which of the following is an advantage businesses have over citizens.pdf
Which of the following is an advantage businesses have over citizens.pdfWhich of the following is an advantage businesses have over citizens.pdf
Which of the following is an advantage businesses have over citizens.pdfizabellejaeden956
 
what is the pseudoautosomal regionA. the region on the Y chromose.pdf
what is the pseudoautosomal regionA. the region on the Y chromose.pdfwhat is the pseudoautosomal regionA. the region on the Y chromose.pdf
what is the pseudoautosomal regionA. the region on the Y chromose.pdfizabellejaeden956
 
What is a flat file database How can it be used for forecasting.pdf
What is a flat file database How can it be used for forecasting.pdfWhat is a flat file database How can it be used for forecasting.pdf
What is a flat file database How can it be used for forecasting.pdfizabellejaeden956
 
What is, in your opinion, the minimum firewall placement for a SCADA.pdf
What is, in your opinion, the minimum firewall placement for a SCADA.pdfWhat is, in your opinion, the minimum firewall placement for a SCADA.pdf
What is, in your opinion, the minimum firewall placement for a SCADA.pdfizabellejaeden956
 
What factor(s) do not contribute to the development of mutations tha.pdf
What factor(s) do not contribute to the development of mutations tha.pdfWhat factor(s) do not contribute to the development of mutations tha.pdf
What factor(s) do not contribute to the development of mutations tha.pdfizabellejaeden956
 
Urinary Tract infections commonly caused by E. Coli is a common illn.pdf
Urinary Tract infections commonly caused by E. Coli is a common illn.pdfUrinary Tract infections commonly caused by E. Coli is a common illn.pdf
Urinary Tract infections commonly caused by E. Coli is a common illn.pdfizabellejaeden956
 
Two samples of sizes 15 and 20 are randomly and independently select.pdf
Two samples of sizes 15 and 20 are randomly and independently select.pdfTwo samples of sizes 15 and 20 are randomly and independently select.pdf
Two samples of sizes 15 and 20 are randomly and independently select.pdfizabellejaeden956
 
True or False The Coefficient of Determination shows the direction .pdf
True or False The Coefficient of Determination shows the direction .pdfTrue or False The Coefficient of Determination shows the direction .pdf
True or False The Coefficient of Determination shows the direction .pdfizabellejaeden956
 
Mechanical Engineer    A technology that had being since the last .pdf
Mechanical Engineer    A technology that had being since the last .pdfMechanical Engineer    A technology that had being since the last .pdf
Mechanical Engineer    A technology that had being since the last .pdfizabellejaeden956
 
The following transactions occurred for London Engineering O (Click .pdf
The following transactions occurred for London Engineering O (Click .pdfThe following transactions occurred for London Engineering O (Click .pdf
The following transactions occurred for London Engineering O (Click .pdfizabellejaeden956
 
Regulation of prokaryotic gene expression is simpler than that in eu.pdf
Regulation of prokaryotic gene expression is simpler than that in eu.pdfRegulation of prokaryotic gene expression is simpler than that in eu.pdf
Regulation of prokaryotic gene expression is simpler than that in eu.pdfizabellejaeden956
 
Q4. We used remote port forwarding in this scenario. How does local .pdf
Q4. We used remote port forwarding in this scenario. How does local .pdfQ4. We used remote port forwarding in this scenario. How does local .pdf
Q4. We used remote port forwarding in this scenario. How does local .pdfizabellejaeden956
 
PYTHON Lottery Number GeneratorQuestion Design a program that ge.pdf
PYTHON Lottery Number GeneratorQuestion Design a program that ge.pdfPYTHON Lottery Number GeneratorQuestion Design a program that ge.pdf
PYTHON Lottery Number GeneratorQuestion Design a program that ge.pdfizabellejaeden956
 
policy instrumens.Hi,can I get helpI choose policy instruments a.pdf
policy instrumens.Hi,can I get helpI choose policy instruments a.pdfpolicy instrumens.Hi,can I get helpI choose policy instruments a.pdf
policy instrumens.Hi,can I get helpI choose policy instruments a.pdfizabellejaeden956
 

More from izabellejaeden956 (20)

E. coli takes up plasmid DNA by which of the following methodsple.pdf
E. coli takes up plasmid DNA by which of the following methodsple.pdfE. coli takes up plasmid DNA by which of the following methodsple.pdf
E. coli takes up plasmid DNA by which of the following methodsple.pdf
 
Consider the two genes described in Question 7. What is the probabili.pdf
Consider the two genes described in Question 7. What is the probabili.pdfConsider the two genes described in Question 7. What is the probabili.pdf
Consider the two genes described in Question 7. What is the probabili.pdf
 
A wireless technology that may someday replace barcodes through the u.pdf
A wireless technology that may someday replace barcodes through the u.pdfA wireless technology that may someday replace barcodes through the u.pdf
A wireless technology that may someday replace barcodes through the u.pdf
 
The director of special events for Sun City believed that he amount o.pdf
The director of special events for Sun City believed that he amount o.pdfThe director of special events for Sun City believed that he amount o.pdf
The director of special events for Sun City believed that he amount o.pdf
 
Write an application containing three parallel arrays that hold 10 e.pdf
Write an application containing three parallel arrays that hold 10 e.pdfWrite an application containing three parallel arrays that hold 10 e.pdf
Write an application containing three parallel arrays that hold 10 e.pdf
 
Which type of project risk is the most relevantStand-alone risk.pdf
Which type of project risk is the most relevantStand-alone risk.pdfWhich type of project risk is the most relevantStand-alone risk.pdf
Which type of project risk is the most relevantStand-alone risk.pdf
 
Which of the following is an advantage businesses have over citizens.pdf
Which of the following is an advantage businesses have over citizens.pdfWhich of the following is an advantage businesses have over citizens.pdf
Which of the following is an advantage businesses have over citizens.pdf
 
what is the pseudoautosomal regionA. the region on the Y chromose.pdf
what is the pseudoautosomal regionA. the region on the Y chromose.pdfwhat is the pseudoautosomal regionA. the region on the Y chromose.pdf
what is the pseudoautosomal regionA. the region on the Y chromose.pdf
 
What is a flat file database How can it be used for forecasting.pdf
What is a flat file database How can it be used for forecasting.pdfWhat is a flat file database How can it be used for forecasting.pdf
What is a flat file database How can it be used for forecasting.pdf
 
What is, in your opinion, the minimum firewall placement for a SCADA.pdf
What is, in your opinion, the minimum firewall placement for a SCADA.pdfWhat is, in your opinion, the minimum firewall placement for a SCADA.pdf
What is, in your opinion, the minimum firewall placement for a SCADA.pdf
 
What factor(s) do not contribute to the development of mutations tha.pdf
What factor(s) do not contribute to the development of mutations tha.pdfWhat factor(s) do not contribute to the development of mutations tha.pdf
What factor(s) do not contribute to the development of mutations tha.pdf
 
Urinary Tract infections commonly caused by E. Coli is a common illn.pdf
Urinary Tract infections commonly caused by E. Coli is a common illn.pdfUrinary Tract infections commonly caused by E. Coli is a common illn.pdf
Urinary Tract infections commonly caused by E. Coli is a common illn.pdf
 
Two samples of sizes 15 and 20 are randomly and independently select.pdf
Two samples of sizes 15 and 20 are randomly and independently select.pdfTwo samples of sizes 15 and 20 are randomly and independently select.pdf
Two samples of sizes 15 and 20 are randomly and independently select.pdf
 
True or False The Coefficient of Determination shows the direction .pdf
True or False The Coefficient of Determination shows the direction .pdfTrue or False The Coefficient of Determination shows the direction .pdf
True or False The Coefficient of Determination shows the direction .pdf
 
Mechanical Engineer    A technology that had being since the last .pdf
Mechanical Engineer    A technology that had being since the last .pdfMechanical Engineer    A technology that had being since the last .pdf
Mechanical Engineer    A technology that had being since the last .pdf
 
The following transactions occurred for London Engineering O (Click .pdf
The following transactions occurred for London Engineering O (Click .pdfThe following transactions occurred for London Engineering O (Click .pdf
The following transactions occurred for London Engineering O (Click .pdf
 
Regulation of prokaryotic gene expression is simpler than that in eu.pdf
Regulation of prokaryotic gene expression is simpler than that in eu.pdfRegulation of prokaryotic gene expression is simpler than that in eu.pdf
Regulation of prokaryotic gene expression is simpler than that in eu.pdf
 
Q4. We used remote port forwarding in this scenario. How does local .pdf
Q4. We used remote port forwarding in this scenario. How does local .pdfQ4. We used remote port forwarding in this scenario. How does local .pdf
Q4. We used remote port forwarding in this scenario. How does local .pdf
 
PYTHON Lottery Number GeneratorQuestion Design a program that ge.pdf
PYTHON Lottery Number GeneratorQuestion Design a program that ge.pdfPYTHON Lottery Number GeneratorQuestion Design a program that ge.pdf
PYTHON Lottery Number GeneratorQuestion Design a program that ge.pdf
 
policy instrumens.Hi,can I get helpI choose policy instruments a.pdf
policy instrumens.Hi,can I get helpI choose policy instruments a.pdfpolicy instrumens.Hi,can I get helpI choose policy instruments a.pdf
policy instrumens.Hi,can I get helpI choose policy instruments a.pdf
 

Recently uploaded

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Explain the advantages and disadvantages of misuse-based and anomaly.pdf

  • 1. Explain the advantages and disadvantages of misuse-based and anomaly-based intrusion detection systems. Solution Misuse based IDS Advantages Misuse IDS provide better visibility of the over system from outside attacks. Misuse has a greater capability of response to the outside attacks Misuse also provide the tracking of virus propagation. Disadvantages Maintain is a difficult task of Misuse based IDS. Misuse requires great amount of staff Anomaly based IDS Advantages News threats can be detected without worrying about the signature which help to protect systems from new threats. This type of IDS requires very little maintenance once the system is deployed. The third advantage is port scan that are conducted over large time frame can be detected. Disadvantages The system must learn and create profile for each user group which lead the system to be unprotected state during learning phase. If attack pretends the attack as normal traffic then this type of IDS would fail to protect the system from outside attacks. The main disadvantage is that this IDS will slows down the performance of overall system.