Messy, a network defender, was hired to secure an organization's internal network. He deployed an IDS in which the detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it.
Identify the type of IDS employed by Messy in the above scenario.
Portia
3 months agoQuentin
3 months agoIola
3 months agoWendell
4 months agoLai
4 months agoMarylyn
4 months agoRuthann
4 months agoVesta
4 months agoPolly
5 months agoLouisa
5 months agoCarolann
5 months agoDominga
5 months agoMitzie
5 months agoGertude
9 months agoGraham
8 months agoTimothy
8 months agoGretchen
9 months agoDorthy
9 months agoJohnson
10 months agoCherelle
9 months agoGeraldo
9 months agoMagnolia
9 months agoNakita
10 months agoFrederica
9 months agoKaty
9 months agoReuben
10 months agoRene
11 months agoVernice
10 months agoIvette
10 months agoAdelle
11 months agoMireya
11 months agoRoy
11 months ago