(Traditional information security methods use strict access control and data encryption strategies for protection, but these strategies are insufficient in a cluttered system. They are an integral part of system security but cannot fully ensure system security
Network and Information Security-Intrusion/Intrusion Detection Technology.ppt)