Identifying Unauthorized Devices: - Asset Management
Identifying Unauthorized Devices: - Asset Management
• Asset management
– 1. Signature-based detection
– 2. Anomaly-based detection
– 3. Detection based on stateful protocol analysis
Intrusion Detection
System