Loowkeychrissy8959 Loowkeychrissy8959 01-06-2023 Computers and Technology contestada Using a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures in their knowledge base to determine whether an attack has occurred or may be under way.