Information gathering with mobile agents
โ
Midori Asaka
๐
Article
๐
1999
๐
John Wiley and Sons
๐
English
โ 330 KB
๐ 2 views
Many network intrusion detection systems detect intrusions by concentrating all logs of target systems in a server and having the server subsequently analyze these logs. At the Information-technology Promotion Agency (IPA), we have been developing an alternate type of network intrusion detection sys