What step in the process of Intrusion Detection as shown in the exhibit would determine if given ale
seenagape
What step in the process of Intrusion Detection as shown in the exhibit would determine if given alerts were part of a bigger intrusion, or would help discover infrequent attacks?