I'm going with the network sensor. It's the one that's actually responsible for monitoring the traffic, so it's gotta be the right answer. Anything else would just be silly.
Ha! I bet the response system is what really takes care of the suspicious activity. Just sits there waiting to spring into action and save the day. Classic IDS move.
Hmm, I'm not so sure. The database of attack signatures could also be involved in the detection process. But the network sensor makes the most sense to me.
Lavonna
17 days agoHannah
20 days agoJerry
21 days agoShawn
28 days agoRonny
10 days agoTelma
20 days agoLanie
2 months agoRoyal
2 months agoAlyce
2 months ago