As Intrusion Detection Systems become more sophisticated, the software manufacturers develop
different methods of detection. If an IDS uses the process of finding a deviation from a well know
pattern of user behavior, what is this known as?

A.
Signature analysis
B.
Packet filter matching
C.
Statistical analysis
D.
Analysis engine engagement
E.
Packet match and alarming