There are several different methods that sensors can be configured to identify malicious traffic, including the following.
Fantastic news! We've Found the answer you've been seeking!
Question:
There are several different methods that sensors can be configured to identify malicious traffic, including the following.
Explain each of them.
a) Signature-based IPS/IDS
b) Policy-based IPS/IDS
c) Anomaly-based IPS/IDS
d) Reputation-based IPS/IDS
Related Book For
Better Business
ISBN: 978-0132496735
2nd edition
Authors: Michael R. Solomon, Mary Anne Poatsy, Kendall Martin
Posted Date: