Wanted Dead or Alive: Snort Intrusion Detection System
Distributed IDS can easily be built and supported using currently available documentation. These systems provide a value to the networks on which they exist. Used properly they can provide information to use while adjusting ACLs on network devices such as routers and firewalls. They also provide...