As an example, an IDS could assume to detect a trojan on port 12345. If an attacker experienced reconfigured it to implement a different port, the IDS may not be capable of detect the presence on the trojan. IDSs and firewalls are complementary. Firewalls experience outside the house the community https://barryn217ttt4.blogsmine.com/profile