Analyzing the traffic of penetration testing tools with an IDS | Publicación