• Detecting and responding to network intrusions.
  • Network traffic analysis and anomaly detection.