-- Michael Starks [I] Immutable Security http://www.immutablesecurity.com
Let's think about the actual attack vectors and hallmarks of an attack.
What happens when a host is attacked? What are the usual sequence of
events that take place? How can OSSEC effectively detect these while
keeping the noise down?
- [ossec-list] 3WoO Day 5: Shared intelligence: what does an ... Michael Starks
- Re: [ossec-list] 3WoO Day 5: Shared intelligence: what... Michael Starks
