This system receives logs from firewalls and other network equipment, including from the operating systems of connected computers. Also, this system can operate in stealth mode, passively as if it is merely a bump on the wire, and hidden from the detection of an attacker.
a. NIDS (Network Intrusion Detection System)
b. HIDS (Host-based Intrusion Detection System)
c. Firewall
d. VPN (Virtual Private Network)