In other words, it is based on anomaly analysis or signature scan?
Best regards,
Simple answer: signature scan.