I am exploring the Intrusion Detection Systems, I am trying to look around 
the way the IDSs working, that is, how IDSs code the signature/pattern of 
the known attacks in its system and how it match coded signature with 
online traffic. Please help me in this regard

-- 
You received this message because you are subscribed to the Google Groups 
"NFORCEIT" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send an email to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to