Technology Limitations: NBA technologies offer strong
detection capabilities for certain types of threats, but they also
have significant limitations. An important limitation is the delay
in detecting attacks. Some delay is inherent in anomaly
detection methods that are based on deviations from a baseline,
such as increased bandwidth usage or additional connection
attempts. However, NBA technologies often have additional
delay caused by their data sources, especially when they rely on
flow data from routers and other network devices. This data is
often transferred to the NBA system in batches; depending on
the product’s capabilities, network capacity, and administrator
preferences, this could occur relatively frequently (e.g., every
minute, every two minutes) or relatively infrequently (e.g.,
every 15 minutes, every 30 minutes). Because of this delay,
attacks that occur quickly, such as malware infestations and
DoS attacks may not be detected until they have already
disrupted or damaged systems.