Which of the following is true of signature-based IDSes?
Which of the following is true of signature-based IDSes? Correct Answer They scan network traffic or packets to identify matches with attack-definition files
They are constantly updated with attack-definition files (signatures) that describe each type of known malicious activity. They then scan network traffic for packets that match the signatures, and then raise alerts to security administrators.
মোঃ আরিফুল ইসলাম
Feb 20, 2025