Advantages
|
Disadvantages
|
It is the very helpful for finding attacks and blocking. |
It has to manually coded and definition the novel attacks when detection the attack of the system. |
It is making actively reporting, prevention and learning. |
The approach is based anomaly detection is not possible to establish the relation between the events. |
They are not passive safety devices such as firewalls and routers. |
Intrusion detection systems produce significantly false alarms |
It can be found security weaknesses of the attack behavior. At which point they may need to be strengthened. |
Attack to be made on data mining can not work as much data when the system is active. |