MSAKARIM
Full Member level 3
In the Intrusion Detection System (Network-based).
Which part of the attack signatures (SNORT Rules) is compared with the input IPV4 packet to know it is an attack or not
Which part of the attack signatures (SNORT Rules) is compared with the input IPV4 packet to know it is an attack or not