68.1k views
1 vote
Using a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures in their knowledge base to determine whether or not an attack has occurred or may be under way.

User Hogi
by
5.4k points

1 Answer

0 votes

Answer:

signature matching

Step-by-step explanation:

Based on the scenario being described within the question it can be said that the process being described is known as signature matching. This process revolves around organizing, navigating through, and retrieving from software libraries in order to try and match to something that has already happened in order to better understand it and maybe prevent/stop the attack.

User Jenilyn
by
5.8k points