|
|
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] NetFlow, role in layered defense network adapters network flows network IPS deploying determining factors role in layered defense 2nd signature tuning network taps network traffic analyzing via anomaly operations via atomic operations via normalizing operations via protocol decode operations via stateful operations capturing devices for with inline mode IPS with promiscuous mode IPS with RSPAN with SPAN with VACLs network-based signatures atomic signatures stateful signatures triggering mechanisms network-level attack mitigation inline prevention promiscuous monitoring system log analysis Nimda worm NIPS, selecting management architecture normalizing traffic 2nd NTP (Network Time Protocol) |
|
|