I'm going with the network sensor. It's the one that's actually responsible for monitoring the traffic, so it's gotta be the right answer. Anything else would just be silly.
Ha! I bet the response system is what really takes care of the suspicious activity. Just sits there waiting to spring into action and save the day. Classic IDS move.
Hmm, I'm not so sure. The database of attack signatures could also be involved in the detection process. But the network sensor makes the most sense to me.
Lavonna
26 days agoBronwyn
7 days agoHannah
29 days agoJerry
30 days agoShawn
1 months agoRanee
3 days agoRonny
19 days agoTelma
29 days agoLanie
2 months agoRoyal
2 months agoAlyce
2 months ago