Research Article

Implementation and Design of a Zero-Day Intrusion Detection and Response System for Responding to Network Security Blind Spots

Figure 12

Ratio of RSC time for first-N storage methods versus full-packet storage method.