- Ignoring frequent false positives
- Avoiding IPSec to support NIDS
- Monitoring only inbound connections
- Using shared network resources to gather NIDS data
- Trusting IDS analysis to non-expert analysts
http://articles.techrepublic.com.com/5100-6350-5785230.html
1 comment:
Good words.
Post a Comment