Answer:
signature matching
Step-by-step explanation:
Based on the scenario being described within the question it can be said that the process being described is known as signature matching. This process revolves around organizing, navigating through, and retrieving from software libraries in order to try and match to something that has already happened in order to better understand it and maybe prevent/stop the attack.