I am exploring the Intrusion Detection Systems, I am trying to look around the way the IDSs working, that is, how IDSs code the signature/pattern of the known attacks in its system and how it match coded signature with online traffic. Please help me in this regard
-- You received this message because you are subscribed to the Google Groups "NFORCEIT" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
