Abstract
Rutgers University Computing Services provides users a four-tiered defense in-depth strategy: planning, prevention, detection, and reaction and recovery. The merging of vulnerability scanning data with intrusion detection systems is a key part within both the planning and prevention defensive layers. This presentation will address how this "target-based" intrusion detection and vulnerability scanning program works.