Skip to main content

Table 1 Comparison of existing and proposed IDS

From: Hybrid intrusion detection system using blockchain framework

Parameters

Existing IDS

Proposed distributed IDS

Detection methodologies

Any one—Signature detection or Anomaly detection

Both—Signature and Anomaly detection in hybrid approach

Signature creation

Very often

For all new attack detected

Mechanism for signature sharing

Not secure

Secured

Distributed

No

Fully distributed

Fault tolerant

No

Yes

Blockchain technology

No

Yes