I wonder whether Network Shield has its threat database

In other words, it is based on anomaly analysis or signature scan?

Best regards,

Simple answer: signature scan.