It identifies attacks based on certain patterns in network traffic, such as the number of bytes, the number of 1s, and the number of 0s. It also identifies malware based on the previously known malicious instruction sequence. The detected patterns in the IDS are known as signatures.
This method can easily detect attacks whose pattern (signature) already exists in the system, but detecting new malware attacks are more difficult as their pattern (signature) is unknown.