Complementing an Intrusion Detection System (IDS) –
The local agents will regulating monitoring tasks by
using triggers and flexible sampling to fetch necessary
information from edge network and end host
and feeding such information to IDS service such as
Snort.