Messy, a network defender, was hired to secure an organization's internal network. He deployed an IDS in which the detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it.
Identify the type of IDS employed by Messy in the above scenario.
Gertude
23 days agoGretchen
2 days agoDorthy
12 days agoJohnson
1 months agoCherelle
2 days agoGeraldo
8 days agoMagnolia
18 days agoNakita
2 months agoFrederica
10 days agoKaty
11 days agoReuben
1 months agoRene
2 months agoVernice
1 months agoIvette
1 months agoAdelle
2 months agoMireya
2 months agoRoy
2 months ago