_______ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.
Pattern matching
Statistical anomaly
Behavioral analysis
Host
Network
Submit