The limitations of IDS products are introduced. The necessary modules in IDS are discussed. A practical IDS method based on database trigger is proposed which can be easily implemented. The principle and implementation of this newly proposed method are detailed. And some typical examples of this method are detailed. The effect of control on network attacks is discussed.
展开▼