Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Signature-based
Network-based
File-based
Anomaly-based
Submit