This makes it possible to identify attacks even if they do not match a known malicious pattern. They identify baselines for specific types of traffic, and capture anomalies that might represent an attack.
0 Comments
Leave a Reply. |