Detection methods

Network intrusion detection systems themselves are not perfect, and are always bombarded with both false positive and false negative notifications and warnings. Consequently, any threat detection system needs both a human element and a technical element. The human element may come in with security analysts who analyze trends, data traffic patterns, behaviors, and reports, as well as those who can determine if anomalous data indicates a potential threat or a false warning.

Let's take a look at different methods.

Get Practical Network Scanning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.