I'm going with the network sensor. It's the one that's actually responsible for monitoring the traffic, so it's gotta be the right answer. Anything else would just be silly.
Ha! I bet the response system is what really takes care of the suspicious activity. Just sits there waiting to spring into action and save the day. Classic IDS move.
Hmm, I'm not so sure. The database of attack signatures could also be involved in the detection process. But the network sensor makes the most sense to me.
Lavonna
1 months agoBronwyn
14 days agoHannah
1 months agoJerry
1 months agoLura
4 days agoErasmo
5 days agoShawn
1 months agoRanee
10 days agoRonny
26 days agoTelma
1 months agoLanie
2 months agoRoyal
2 months agoAlyce
2 months ago