25 May
2005
25 May
'05
6:59 p.m.
On 5/25/05, Per Gregers Bilse <bilse@networksignature.com> wrote:
(snip)...which then deploy a unique and highly innovative method (patent pending) for identifying and filtering out the attack traffic, while letting bona fide traffic through unhindered. ...(snip)
well, that is the important part. there are plenty of off the shelf tools that allow someone to gather and analyze pertinent network data; the most important, and consequently most difficult, part is differentiating the good from the bad. I'm not aware of any free/open/cheap tools that go beyond the basic "your <insert metric here> has exceeded the baseline" alert. aaron.glenn