Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Network-based
File-based
Signature-based
Anomaly-based
Submit