Which of the following IDS/IPS detection methods allows an administrator to define what normal traffic patterns are supposed to look like?
A) Signature-based detection
B) Policy-based detection
C) Statistical anomaly detection
D) Non-statistical anomaly detection