Involes an attempt to define a set of attack patterns that can be sed to decide that agiven behaviour is that of a intruder and often referred to as signature detection.
a. True
b. False