IDS: Detecting and rectifying an attack

5

Author: JT Smith

theHighlander writes: “Talking of network intrusions, most follow a similar pattern. Here is a peek into a typical intrusion scenario, which leads to the adoption of a detection method, followed by the rectification and reconfigurations stages to set right the intrusion. Read on…”

Category:

  • Linux