A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions is called
◦ log analysis.
◦ intrusion detection systems.
◦ continuous monitoring.
◦ defense in depth.