Summary of Process Models for Intrusion Detection
2025, March 11
Data Collection
Data Preprocessing
Feature Extraction
Detection/Analysis
Alert Generation
Response/Action
Data Collection → Feature Extraction → Detection → Alert → Response
Model | Advantages | Limitations |
---|---|---|
Signature | Fast, low resource usage, accurate for known | Misses new/variant attacks |
Anomaly | Detects unknown threats, adaptable | High false positives, complex setup |
Hybrid | Combines strengths, broader coverage | Complex, higher computational cost |