An organization requires a security control that verifies an ongoing network communication for signs of anomalous activities and alerts administrators if suspicious traffic patterns are detected. Which type of control aligns BEST with these requirements?
Corrective control
Deterrent control
Detective control
Preventive control