Monitors network traffic to identify breaches

Source documents