Messy, a network defender, was hired to secure an organization's internal network. He deployed an IDS in which the detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it.
Identify the type of IDS employed by Messy in the above scenario.
Portia
4 months agoQuentin
5 months agoIola
5 months agoWendell
5 months agoLai
5 months agoMarylyn
6 months agoRuthann
6 months agoVesta
6 months agoPolly
6 months agoLouisa
6 months agoCarolann
6 months agoDominga
6 months agoMitzie
6 months agoGertude
11 months agoGraham
10 months agoTimothy
10 months agoGretchen
10 months agoDorthy
10 months agoJohnson
11 months agoCherelle
10 months agoGeraldo
10 months agoMagnolia
11 months agoNakita
12 months agoFrederica
10 months agoKaty
10 months agoReuben
11 months agoRene
1 year agoVernice
11 months agoIvette
11 months agoAdelle
1 year agoMireya
1 year agoRoy
1 year ago