May 9, 2001

IDS: Detecting and rectifying an attack

Author: JT Smith

theHighlander writes: "Talking of network intrusions, most follow a similar pattern. Here is a peek into a typical intrusion scenario, which leads to the adoption of a detection method, followed by the rectification and reconfigurations stages to set right the intrusion. Read on..."


  • Linux
Click Here!