Intrusion Detection
Intrusion
Detection
System
4. Analysis of Dump
Internal
Host
Network
Administrator
Attacker
Legitimate
Host
1. Attack
Packet
2. All Packets
3.
Notification
of Possible
Attack
1. Legitimate
Packet
Previous slide
Next slide
Back to first slide
View graphic version