Operating System Security Intrusion Detection
Q What are the characteristics of signature based IDS?
  • A A. Most are based on simple pattern matching algorithms
  • B B. It is programmed to interpret a certain series of packets
  • C C. It models the normal usage of network as a nosie characterization
  • D D. Anything distinct from the nosie is assumed to be intrusion activity
Leave a Comment