Watch this video on YouTube
What is the primary difference between signature-based detection and behavioral-based detection in an Intrusion Detection System (IDS)?