On 5/25/05, Per Gregers Bilse <[EMAIL PROTECTED]> wrote: 
> (snip)...which then deploy a unique and highly innovative
> method (patent pending) for identifying and filtering out the attack
> traffic, while letting bona fide traffic through unhindered.  ...(snip)

well, that is the important part. there are plenty of off the shelf
tools that allow someone to gather and analyze pertinent network data;
the most important, and consequently most difficult, part is
differentiating the good from the bad. I'm not aware of any
free/open/cheap tools that go beyond the basic "your <insert metric
here> has exceeded the baseline" alert.

aaron.glenn

Reply via email to