The Question |
Is it possible to leverage the power of today's commercial
RDBMS packages to simplfy the tast of managing and searching intrusion
detection data? Can we make it easier for the administrator to archive
and manipulate this information, make it easier for the security personel
to audit and mine this data, and easier for the manager to interpret this
data? If so, can we do it in a way that is inexpensive and performs well? |
|
|