A specific intrusion detection and prevention system (IDPS) scans events against known attack patterns. Which technique is the IDPS using?
Plug-in-based detection
Signature-based detection
Device-based detection
Anomaly-based detection
Submit