Which intrusion detection system will use well defined models of how an attack occurs?

Which intrusion detection system will use well defined models of how an attack occurs?

Which intrusion detection system will use well defined models of how an attack occurs?

A.
Anomaly

B.
Protocol

C.
Signature

D.
Behavior



Leave a Reply 0

Your email address will not be published. Required fields are marked *