Let's think about the actual attack vectors and hallmarks of an attack. What happens when a host is attacked? What are the usual sequence of events that take place? How can OSSEC effectively detect these while keeping the noise down?

--
Michael Starks
[I] Immutable Security
http://www.immutablesecurity.com

Reply via email to