Watch this video on YouTube
How do Statistical-based Intrusion Detection Systems (IDSs) typically operate?