Anomaly detection involves actual software that works to detect intrusion attempts and notify the administrator. The system looks for any anomalous behavior. Any activity that does not match the pattern of normal user access is noted. Go to Google.com and search for information on how anomaly detection works and then answer the question: How does the IDS define normal use? A good place to find information about IDS system types is http://infosecuritymag.techtarget.com/articles/august01/cover.shtml.
“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”
The post Anomaly detection first appeared on nursing writers.