On-Demand Webinar: Deep Session Inspection and rich metadata can change your security game.

What is a signature in cyber security?

A signature is a unique identifier derived from known malicious code or behavior—such as a specific sequence of bytes, file hash, or pattern of network activity. In cybersecurity, signatures serve as precise markers that allow security tools to recognize and flag threats that have been analyzed and cataloged.

What is Signature Based Detection?

Signature based detection is a method that scans files, processes, or network traffic for those previously identified markers. When a match occurs, the system raises an alert or automatically blocks the threat. 

Signature based detection relies on a maintained database of these fingerprints. As new malware samples emerge, their signatures are extracted and added to the database. During scans, the detection engine compares incoming data against this repository, enabling rapid identification of known threats with minimal performance impact.

Advances and Disadvantages of Signature Based Detection

AdvancesDisadvantages
Rapid identification of known malware with low false positive ratesCannot detect new or modified threats lacking existing signatures
Minimal resource overhead, since pattern matching is computationally simpleRequires frequent updates to keep pace with evolving threats
Proven reliability for well documented exploits and widespread malware typesIneffective against polymorphic or zero-day attacks that alter their signatures
Read the blog to dig deeper into Signature Based Detection.

Want to Dive Deeper?

Enhance your perspective with additional analysis and experts take!

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.