For example, an IDS could assume to detect a trojan on port 12345. If an attacker experienced reconfigured it to implement another port, the IDS is probably not able to detect the presence from the trojan. Reduced Fake positives - correlating intrusion alerts with facts from other units allows safety https://georgesb738vvw4.daneblogger.com/profile