Watch this video on YouTube
What conceptual characteristic distinguishes an anomaly-based Intrusion Detection System (IDS) from a signature-based IDS among the following options?