This paper discusses the caveats of enplacement of an IDS environment, and
what companies are doing about it. Discussion over what may be one (of many)
possible method of "hiding" an intrusion detection system environment.
This document is in pdf format. To
view it click here.
related diagram click here.