Create your own rules to detect threats by monitoring system calls.
no related pages
Source: Linux Magazine Full Feed