blackberry 0 Unverified User

hi my friends.
as i know there are many implemented NIDS based on misuse detection as snort.
but my question is about anomaly detection based systems.
is there anyone implemented?


cheers.

Be a part of the DaniWeb community

We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.