From: Hybrid intrusion detection system using blockchain framework
Parameters | Existing IDS | Proposed distributed IDS |
---|---|---|
Detection methodologies | Any one—Signature detection or Anomaly detection | Both—Signature and Anomaly detection in hybrid approach |
Signature creation | Very often | For all new attack detected |
Mechanism for signature sharing | Not secure | Secured |
Distributed | No | Fully distributed |
Fault tolerant | No | Yes |
Blockchain technology | No | Yes |