Intrusion Detection with MOM - Going Above the Wire

There are several areas, or layers, where intrusions into a system can occur. At the 'wire' or network layer there are several tools that can successfully discern the nature of traffic for most commercial protocols. But how do you respond to the challenge of knowing what happens when you need to...
July 29, 2003

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg