Abstract
All currently available network intrusion detection systems rely upon a mechanism of data collection-passive protocol analysis- which is fundamentally flawed. In passive protocol analysis, the intrusion detection system unobtrusively watches all traffic on the network, and scrutinizes it for patterns of suspicious activity...