GIAC Intrusion Detection Curriculum
IDS strategies require on-going maintenance to ensure latest attacks will be detected and that the logs are carefully archived for future analysis and reference. As we have seen, we cannot be complacent by solely relying on the automated triggering of alerts or the lack of triggered alerts.
33058 (PDF, 2.25MB)
7 Apr 2009ByToshi Iijma
