What are the characteristics of signature based IDS?
(a) Most are based on simple pattern matching algorithms
(b) It is programmed to interpret a certain series of packets
(c) It models the normal usage of network as a noise characterization
(d) Anything distinct from the noise is assumed to be intrusion activity
This question was posed to me by my college professor while I was bunking the class.
This is a very interesting question from Security in portion Security of Operating System