I have planned to pursue research on network intrusion detection.

Can anyone help me on how to extract information on anomalous flow from a live network connection?

More Dhanabal Lakshmanan's questions See All
Similar questions and discussions