In: Computer Science
Fill in the blanks. Enter T for true and F for false about the following statements regarding signature-based and anomaly-based intrusion detection systems.
a) (T/F)Signature-based detection is like anti-virus scanners and if a signature is not available then they will miss detecting the attack.
b) (T/F)Anomaly-based detection relies on statistics and artificial intelligence to characterize abnormal network traffic from normal traffic.
c) (T/F) If there is a real change in behavior of the traffic e.g. during final exams week there is a lot of network traffic at the university the anomaly-based IDS will adjust automatically and exhibit low false positive rate.
d) (T/F)Signature-based detection can detect zero-day attacks much more reliably than can anomaly-based intrusion detection systems.