What are the three types of malicious traffic detection methods?

A) Signature, policy, and anomaly based
B) IDS, IPS, and IRS based
C) NIDS, HIPS, and NIPS based
D) Symmetric, asymmetric, and transparent based

A
Explanation: Consider the following approaches for detecting malicious traffic:
• Signature-based detection
• Policy-based detection
• Anomaly-based detection
The primary method used to detect and prevent attacks using IDS or IPS technologies is signature based. Another approach to IDS/IPS detection is policy based. With a policy-based approach, the IDS/IPS device needs a specific declaration of the security policy. A third approach to detecting or preventing malicious traffic is anomaly based. This approach is prone to false positives because a normal condition is difficult to measurably define.

Computer Science & Information Technology

You might also like to view...

The character spacing option expands or compresses spacing between characters by a specified number of points

Indicate whether the statement is true or false

Computer Science & Information Technology

Organized crime groups want to remain unrecognized and have no impact within their communities

Indicate whether the statement is true or false.

Computer Science & Information Technology