What are the different ways to classify an IDS?
(a) anomaly detection
(b) signature based misuse
(c) stack based
(d) all of the mentioned
This question was posed to me during an interview.
My question is based upon Security topic in chapter Security of Operating System