header bg


An IDS can detect a wide range of attacks. Signature-based detection, anomaly-based detection, and protocol-based detection are the three most popular detection approaches. Which of the following is the most accurate description of protocol-based detection?

A This detection method can include malformed messages and sequencing errors.