As Intrusion Detection Systems become more sophisticated, the software manufacturers develop different methods of detection. If an IDS uses the process of finding a deviation from a well know pattern of user behavior, what is this known as?
A.
Signature analysis
B.
Packet filter matching
C.
Statistical analysis
D.
Analysis engine engagement
E.
Packet match and alarming
I have the same idea. C