Network Security
Signature-Based Detection
Also known as: Pattern matching detection
Definition
A detection method that compares observed traffic, files, or behaviour against a database of known-bad patterns (signatures) to flag malicious activity.
Examples
- ClamAV identifying a file by SHA-256 against its malware database.
- Suricata triggering on the regex inside an HTTP body that matches a known web-shell signature.
Related terms
Anomaly-Based Detection
A detection approach that builds a baseline of normal activity and flags deviations from it as potentially malicious.
Intrusion Detection System (IDS)
A passive security control that monitors network or host activity for malicious behaviour and raises alerts without blocking traffic.
Intrusion Prevention System (IPS)
An inline security control that detects malicious traffic and actively blocks, resets, or scrubs it in real time.
Deep Packet Inspection (DPI)
An inspection technique that examines the full payload of network packets — not just headers — to identify applications, content, and threats.
Malware Analysis
Malware Analysis — definition coming soon.
EPP (Endpoint Protection Platform)
A preventive endpoint security suite that combines antivirus, anti-malware, host firewall and exploit protection to block threats before they execute on a device.