Summary of Process Models for Intrusion Detection
2025, March 11
Data Collection
Data Preprocessing
Feature Extraction
Detection/Analysis
Alert Generation
Response/Action
Data Collection → Feature Extraction → Detection → Alert → Response
| Model | Advantages | Limitations |
|---|---|---|
| Signature | Fast, low resource usage, accurate for known | Misses new/variant attacks |
| Anomaly | Detects unknown threats, adaptable | High false positives, complex setup |
| Hybrid | Combines strengths, broader coverage | Complex, higher computational cost |