LinuxSecurity Contributor writes, “In this paper, Anton looks at network intrusion systems, IDS-triggered countermeasures, what are they, how they can be triggered and when they should not be triggered.”
http://www.linuxsecurity.com/feature_stories/ids-a ctive-response.html.
http://www.linuxsecurity.com/feature_stories/ids-a ctive-response.html.
Category:
- C/C++