As Intrusion Detection Systems become more sophisticated, the software manufacturers develop different methods of detection. If an IDS uses the process of matching known attacks against data collected in your network, what is this known as?

A.
Signature analysis
B.
Packet filter matching
C.
Statistical analysis
D.
Analysis engine engagement
E.
Packet match and alarming
I choose A