I'm going with the network sensor. It's the one that's actually responsible for monitoring the traffic, so it's gotta be the right answer. Anything else would just be silly.
Ha! I bet the response system is what really takes care of the suspicious activity. Just sits there waiting to spring into action and save the day. Classic IDS move.
Hmm, I'm not so sure. The database of attack signatures could also be involved in the detection process. But the network sensor makes the most sense to me.
Lavonna
2 months agoMozell
14 days agoCathrine
26 days agoAfton
27 days agoBronwyn
1 months agoHannah
2 months agoJerry
2 months agoGlory
25 days agoLura
1 months agoErasmo
1 months agoShawn
2 months agoRanee
1 months agoRonny
2 months agoTelma
2 months agoLanie
3 months agoRoyal
3 months agoAlyce
3 months ago