Compare and contrast signature-based and anomaly-based network intrusion detection systems. In your analysis, describe at least three ways in which the two types of IDS are similar, and at least three ways in which they differ.
Additional information
The problem related to Computer Science and it defines about comparing and contrasting signature and anomaly based network intrusion detection systems.
Word limit: 125