At which two traffic layers do most commercial IDSes generate signatures?
(a) Application layer and Network layer
(b) Network layer and Session Layer
(c) Transport layer and Application layer
(d) Transport layer and Network layer
I had been asked this question in exam.
Question is taken from Intrusion Detection Systems topic in division Point to Point Protocol & Error Detection of Computer Network