Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the
corporate network. He has tasked the security engineers to implement a technology that is
capable of alerting the team when unusual traffic is on the network. Which of the following types of
technologies will BEST address this scenario?
A.
Application Firewall
B.
Anomaly Based IDS
C.
Proxy Firewall
D.
Signature IDS