exiZT20611 exiZT20611 27-12-2023 Computers and Technology contestada Which IDS method looks for patterns in network traffic and compares them to a database of known threats?