Anomaly-based vs Behavior-based IDS/IPS

in Security+
Darril's book considers that these 2 terms are the same thing. But I have seen a few practice questions now that have both terms as possible answers, and only one of them is right.
So what is the difference?
Thanks
So what is the difference?
Thanks
Decide what to be and go be it.
Comments
IDS = Intrusion detection system which by nature is a passive device (hardware or software, host or network based) that monitors network traffic or systems at various levels based on certain logic, rules, signatures, baselines or a combination of the above in an attempt to identify intrusions during the act.
IPS = Intrusion prevention system. Is closely related to an intrusion detection system and serves basically all of the same functions with an added function. The ability to take some sort of mitigating action to "prevent" what if percieves to be an attack. This could be in the form of firewalling certain ports, stopping certain services, disabling a systems NIC or any other form of mitigating act.
Keep in mind these are vendor neutral terms and your CCNA books may be referring to Cisco's own implementation.
There is both Host-based and network based IDS and IPS, when you refer to stopping something on the wire, this would be in a network based implemenation.
For a more thourgh explanation of these technologies refer to Shon Hariss All-in-one CISSP training kit.
Might I also suggest Safari books online service that allows you access to thousands of books for 10$ a month? I have no affiliation with them, just a customer.
That's a good point. I should have said that I was talking about a NIDS and NIPS. HIDS and HIPS are different animals.
Does anyone have an answer to this question?
They usually mean the same thing. They detect intrusions based upon "unusual" network traffic.
Here is the Wiki article explaining Anomaly based:
Anomaly-based intrusion detection system - Wikipedia, the free encyclopedia
Here is the FAQ on SANS:
SANS: Intrusion Detection FAQ: What is behavior-based intrusion detection?
Not exactly. It does the same thing, but there is a whole different process involved to get to that decision.