An IDS can detect a wide range of attacks. Signature-based detection, anomaly-based detection, and protocol-based detection are the three most popular detection approaches. Which of the following is the most accurate description of protocol-based detection?
A
This detection method can include malformed messages and sequencing errors.
Comments