Signature-Based or Anomaly-Based Intrusion Detection: The Practice and Pitfalls

By on

Intrusion detection has become big business on the Internet and, to be honest, it's not surprising.

With the profusion of e-commerce web sites, online banking and other high profile applications, it is understandable that organizations should want to avail themselves of the best possible protection against unauthorized entry. But, the threat of network intrusion is much wider than those ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Log In

Username:
Password:
|  Forgot your password?