Please enable JavaScript.
Coggle requires JavaScript to display documents.
Module 11: IPS TEchnologies, image - Coggle Diagram
-
-
- Malicious traffic is send to the target host that is inside the network
- The traffic is routed into the network and received by an IPS-enabled sensor where it is blocked
- The IPS-enabled sensor sends logging information regarding the traffic to the network security management console.
- The IPS-enabled sensor kills the traffic (It is sent to the "Bit Bucket")
-