THE SINGLE BEST STRATEGY TO USE FOR NETWORK SECURITY MONITORING