Information:
Instead of relying on a database of known attack
signatures, this program analyzes the normal
behavior of a system and uses that information to
detect abnormal behavior. It can both detect and stop
previously unknown attacks as well as known attacks.
Note: This program will replace your existing kernel and
should, therefore, only be installed by very experienced users or system administrators. See the home page for more details.