I have planned to pursue research on network intrusion detection.

Can anyone help me on how to extract information on anomalous flow from a live network connection?

Similar questions and discussions