Application protocol-based intrusion detection system: Difference between revisions

Content deleted Content added
See also: added example of apids sw.
Line 5:
 
A typical place for an APIDS would be between a [[web server]] and the [[database management system]], monitoring the [[SQL]] protocol specific to the [[middleware]]/[[business logic]] as it interacts with the [[database]].
Andre thinks he knows everything
 
== Monitoring dynamic behavior ==