What examines the collected network traffic and compares it to known patterns of suspicious activity stored in the signature database *?

-The de facto standard IDS engine since its creation in 1998. It has a large user base and set the standard for many IDS element, including rule sets and formats.

-Snort rules are the list of activities that Snort will alert on and provide the flexible power behind the IDS platform.

-Snort rule sets are updated by a large active community as well as Sourcefire Vulnerability Research Team, the company behind Snort. Snort VRT rule sets are available to subscribers and provide such elements as same-day protection for items such as Microsoft patch Tuesday vulnerabilities.

-These rules are moved to the open community after 30 days.

What examines the collected network traffic and compares it to known patterns of suspicious activity stored in the signature database?

Examines the collected network traffic and compares it to known patterns of suspicious or malicious activity stored in the signature database. The analysis engine is the "brains" of the IDS. -An IDS model where the IDS must know what "normal" behavior on the host or network being protected really is.

Which component of an IDS examines the collected network traffic and compares it to known patterns of suspicious or malicious activity?

The analysis engine is the "brains" of the IDS. A collection of patterns and definitions of known or suspicious activity.

Which term defines a collection of predefined activity patterns?

Signature Databse. A collection of activity patterns that have already been identified and categorized and that typically indicate suspicious or malicious activity.

What is composite signature based analysis?

An example of a composite signature is one that looks at a series of fragments from the same connection and determines whether the fragments are overlapping (this would be an obvious attack because a real fragmented packet can be reassembled, whereas overlapping fragments cannot).