next up previous
Next: Misuse detection Up: Intrusion Detection 101 Previous: Host data

Network data



Dug Song
1999-09-17