To attenuate Untrue positives, IPS techniques differentiate involving legitimate threats and benign information. Intrusion prevention programs achieve this employing many methods which includes signature dependent detection, which depends on known patterns of exploits; anomaly dependent detection, which compares community activity in opposition to