Skip to Content

What Is Signature-based Intrusion Detection?

Every application—including malware—has a distinct pattern from its actions, file size, file hashes, and compiled code. This pattern is called a signature. Signature-based intrusion detection examines traffic across a network to detect malicious software signatures. Although it’s an older form of malware detection, signature-based detection is accurate and still viable in cybersecurity and data protection.

What Is Signature-based Intrusion Detection?

Signature-based intrusion detection identifies threats by comparing system activity to a database of known attack patterns or signatures to detect malicious behavior.

Malware, like any program, is compiled into binary computer language. Its compiled code can be hashed to create a unique signature, but other characteristics can also create a signature. The actions malware performs along with its in-memory code can determine its unique signature. Some malware displays author phrases stored in memory, while others will store specific files in specific locations, which also feeds into its specific pattern.

Modern malware often communicates with a command-and-control (C2) location. The malware has hardcoded IP addresses or domain names to communicate with the author. Communication lets the attacker know that a targeted machine is now running the malware and their attack was successful. Firewalls and intrusion detection systems can detect requests to communicate on these IP addresses and domains to alert administrators of suspicious activity.

How Signature-based Intrusion Detection Works

To work with signature-based intrusion detection, you first need to store malware signatures. Signatures are stored in a database, usually provided by the intrusion detection provider. The signature chosen to be an indicator is decided by security researchers who often share their findings in open source locations. For example, the popular YARA tool can be used to classify and create malware signatures.

Intrusion detection systems continually monitor network traffic for malware signatures. They compare network traffic with the signatures stored in the intrusion detection system database. When a signature is detected in traffic, intrusion detection takes action such as alerting administrators.

Advantages of Signature-based Intrusion Detection

Because signatures are built from malware, it’s a much more accurate system than other anomaly-based detection. Signatures are static, provided that the malware author does not make changes and introduce a variant, so intrusion detection with an updated database has very few false positives. False positives happen when the intrusion detection flags an application incorrectly.

Another advantage of signature-based detection is it’s quick and doesn’t require any benchmark data. Signatures can be quickly identified without first collecting data to determine if activity does not match benchmarks. For example, anomaly-based detection needs a benchmark of activity on files before it can determine if too many access requests could be malware or common network activity.

Limitations of Signature-based Intrusion Detection

To have malware signatures, the threat must be known. Zero-day threats are those unseen in the wild, so they have no signature to detect. A lack of signatures in zero-day threats means that intrusion detection reliant on signatures cannot detect them. Without full coverage, this type of intrusion detection can give administrators a false sense of security.

Signature-based intrusion detection also needs more resources than other forms of intrusion detection. Traffic is constantly compared to a list of signatures in a database, and your signature database could have millions of stored items. To have intrusion detection using signatures, you must also ensure that the database is consistently updated. Cloud providers usually provide updates, but local storage might require manual actions from network administrators.

Use Cases and Applications

Any industry with local and cloud data can leverage signature-based intrusion detection, but it’s often used as a single component in data protection. Signature-based intrusion detection is great for identifying known threats immediately with few false positives. For example, a healthcare provider can use this type of intrusion detection to protect against known ransomware. Ransomware commonly targets healthcare agencies, hospitals, and insurance companies because they often have legacy outdated software. Signature-based protection can stop these threats instantly, especially when paired with intrusion prevention systems.

Customer service organizations are another common target because they receive attachments from customers to review. If an attachment contains malware, the malware’s signature could be detected. Intrusion detection is valuable in network segments where third-party email attachments are downloaded and stored.

Conclusion

Business-level cybersecurity requires several layers of protection. Signature-based intrusion detection is one layer, but you’ll need several others to fully protect your environment. With signature-based security, you can protect your environment from known threats, which are a big factor in data breaches.

Storing signatures and other security analytics requires robust storage systems. Pure Storage has the speed and capacity for large environments with complex intrusion detection. Pure Storage has partnered with Elasticsearch for faster searches and resilient architecture for scaling.

 

다음을 추천드립니다.

04/2025
Real-time Enterprise File Service on the Pure Storage Platform
Discover how the Real-time Enterprise File Service addresses the evolving challenges of data management by consolidating all file needs within a unified platform.
백서
20 pages

주요 자료 및 이벤트를 확인하세요

THOUGHT LEADERSHIP
혁신을 향한 레이스

스토리지 혁신의 최전선에 있는 업계 리더들의 최신 인사이트 및 관점을 확인하세요.

더 알아보기
분석 보고서
사이버 복원력 있는 미래를 계획하세요

사이버 보안에 대한 투자를 최대한 활용하고 신속한 대응 및 복구를 보장하기 위한 협력 전략에 대해 알아보세요.

보고서 읽기
유용한 자료 모음
스토리지의 미래: AI 시대를 위한 새로운 원칙

성공을 위해서는 새로운 사고와 현대적인 접근 방식이 필요하며, AI 라는 새 도전과제가 데이터 스토리지 요구 사항을 어떻게 변화시키고 있는지 알아보세요.

eBook 다운로드
유용한 자료 모음
스토리지 구매를 중단하고 플랫폼을 도입하세요

엔터프라이즈 스토리지 플랫폼의 요구 사항, 구성 요소 및 선택 프로세스에 대해 알아보세요.

보고서 읽기
연락처
퓨어스토리지에 문의하기Info icon
Chat icon
질문하기

퓨어스토리지 제품이나 인증 관련 질문이나 코멘트가 있으신가요?   저희가 도와드립니다.

Key icon
데모 예약

라이브 데모를 예약하고 퓨어스토리지가 데이터를 어떻게 강력한 결과로 전환해주는지 직접 확인해 보세요. 

연락하기: +82 2 6001-3330

언론홍보팀:  pr@purestorage.com

 

퓨어스토리지코리아 주소

30F 아셈타워,

517 영동대로,

강남구, 서울

대한민국

korea@purestorage.com

닫기
닫기Close X icon
지원하지 않는 브라우저입니다.

오래된 브라우저는 보안상 위험을 초래할 수 있습니다. 최상의 경험을 위해서는 다음과 같은 최신 브라우저로 업데이트하세요.