Supplying a quick and helpful reporting procedure when anomalous or destructive exercise happens, which allows the threat to be handed up the stackCoordinated, reduced-bandwidth assaults: coordinating a scan amongst numerous attackers (or brokers) and allocating different ports or hosts to diverse attackers can make it tough for that IDS to correla