May 9, 2001
IDS: Detecting and rectifying an attack
Author: JT Smith
theHighlander writes: "Talking of network intrusions, most follow a similar pattern. Here is a peek into a typical intrusion scenario, which leads to the adoption of a detection method, followed by the rectification and reconfigurations stages to set right the intrusion. Read on..."