In their earliest versions, intrusion-detection systems focused extensively on postevent audit-trail analysis. Today, IDS applications monitor, detect and respond to unauthorized activities within ...