Respuesta :

Answer:

profiles

Explanation:

Fill in the blanks

Anomaly detection systems make use of profiles that describe the services and resources each authorized user or group normally accesses on the network.