Frontpage
Back
Navigation
Figure 2
«
Previous
|
Detecting intruders with Suricata
|
Next
»
Figure 2: Suricata packet processing system.