A deviation from the standard protocol. An intrusion detection system (IDS) may look for protocol anomalies in order to identify attacks without a signature. Protocol anomalies reduce false positives with well-understood protocols, but may cause false positives with poorly understood or complex protocols. See IDS.
Search For protocol anomaly On ChannelWeb
Find the latest news and information on protocol anomaly from across the Channelweb Network of IT Web sites.