IT Security Forensics: Network Behavior Analysis

Today, many IDS, IPS, and IT Security Forensics vendors purport that most threats are best combated using their Signature-based solutions. Well ‘best’ may be only a small