header bg

Scan QR code or get instant email to install app


An IDS can detect a wide range of attacks. Signature-based detection, anomaly-based detection, and protocol-based detection are the three most popular detection approaches. Which of the following is the most accurate description of protocol-based detection?

A This detection method can include malformed messages and sequencing errors.

Related Information