Intrusion detection in a data center environment
A technology of intrusion detection and intrusion detection system, applied in the direction of data exchange network, electrical digital data processing, digital transmission system, etc., can solve the problems of inability to use the third IDS to monitor the third subnet, limit the number of sessions, etc., and achieve large Granularity, removal of traffic noise, effect of reducing false positives
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] In describing the embodiments of the present invention herein, numerous specific details are provided, such as examples of components and / or methods, in order to provide a thorough understanding of the embodiments of the present invention. Those skilled in the art will appreciate, however, that embodiments of the invention may be practiced without one or more of these specific details, or with other apparatus, systems, assemblies, methods, components, components, and the like. In other instances, well-known structures, materials, or operations are not specifically shown or described in detail to avoid obscuring aspects of the embodiments of the invention.
[0019] Referring now to the drawings in more detail using the numerals, figure 1 A network segment 10 of a network environment is shown in . Network segment 10 is an example of a portion of a network environment typically used in a data center or large institutional or enterprise network. The network environment 1...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 