Identify and briefly describe the two primary approaches to developing signatures for network-Based IDS tools. Is one technique preferred over the other? Explain why.
Need about 6-8 sentences answering the question. I will tip big for excellent work.