Is a technique for examining and verifying current network traffic for packets that do not conform to TCP/IP protocol specifications.
a) Intrusion Detection System (IDS)
b) Firewall
c) Virtual Private Network (VPN)
d) Proxy Server