Introduction - If you have any usage issues, please Google them yourself
Information collected intrusion detection system to be analyzed to judge whether there is a network behavior and security policy violations were signs of attack, if found traces of the invasion, considered normal behavior consistent behavior is normal behavior, and aggressive behavior consistent the intrusion.