ABSTRACT

As in military systems, an allied force would set up spies whose task is to detect intrusions, and any covert activities. Figure 2.3 illustrates this concept, where intrusion detection agents are used to listen to network traffic and network/user activity to try and detect any breaches in security.