Anomaly detection systems make use of _______________ that describe the services and resources each authorized user or group normally accesses on the network.
Anomaly detection systems make use of profiles that describe the services and resources each authorized user or group normally accesses on the network.