Intrusion Signature

What Does Intrusion Signature Mean?

An intrusion signature is a kind of footprint left behind by perpetrators of a malicious attack on a computer network or system. Each intrusion signature is different, but they may appear in the form of evidence such as records of failed logins, unauthorized software executions, unauthorized file or directory access, or improper use of administrative privileges.


Techopedia Explains Intrusion Signature

Intrusion signatures are recorded and logged by intrusion detection systems and studied and documented by system administrators who can often configure or modify the system to prevent the same attack from happening again, thus strengthening security against future attacks. System administrators may be able to determine such investigative information about how and when the intrusion was executed and the skill level of the perpetrator.

Most intrusion detection systems use one of the following detections methods:

  • Signature-based detection
  • Statistical anomaly-based detection
  • Stateful protocol analysis detection

By recording and logging intrusion signatures in a database, the signature-based detection method monitors network traffic in search of signature matches. When these are found, the detection system takes the appropriate action.

Two types of intrusion signatures are commonly used

  • Exploit based
  • Vulnerability based

Intrusion detection systems use the former to analyze patterns previously recorded and protect against repetitions; they use the latter by analyzing vulnerabilities in a program, the program’s executions and the conditions needed to exploit those vulnerabilities.


Related Terms

Latest Cybersecurity Terms

Related Reading

Margaret Rouse

Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical, business audience. Over the past twenty years her explanations have appeared on TechTarget websites and she's been cited as an authority in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine and Discovery Magazine.Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages. If you have a suggestion for a new definition or how to improve a technical explanation, please email Margaret or contact her…