_______ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.

A.
Pattern matching
B.
Statistical anomaly
C.
Behavioral analysis
D.
Host
E.
Network
You must be logged in to post a comment.
a
0
0