Intrusion detection system

It is an application designed to discover unauthorized access to any element of our infrastructure. This system evaluates an intrusion when this takes place, examining communications, and identified by heuristics, or patterns (called signatures), classified as common attacks that allow you to differentiate normal traffic anomalies that may be indicative of suspicious or malicious activities including attacks that originate within the system. A typical example is the early stages of any attack, as the analysis of network and port scanning.

joomla template 1.6