Skip to main content
. 2022 Jun 13;7:e814. doi: 10.7717/peerj-cs.814

Table 1. Summary of IDS techniques.

Methods Signature-based Anomaly-based Hybrid-based
Advantage
  • ✓ Easy to implement in real-time

  • ✓ Low cost

  • ✓ Effective against unknown attacks

  • ✓ Effective against new attacks without database update

  • ✓ High accuracy rating

Limitation
  • ✓ Ineffective against zero-day attacks

  • ✓ Must update the database for new attacks

  • ✓ Difficult to implement at run-time

  • ✓ Detection accuracy affected by the number of collected features in dataset

  • ✓ Cost is high