First page Back Continue Last page Summary Graphics
Other DTK actions
Other actions are programmable
- shut off access to the IP address
- switch all services to deceptions for the IP address
- increase response delays to slow attackers
- run traceback programs and notify via pager
- coordinate with other DTK response units
- pull log trails from remote monitoring stations
- anything you want to program into it
Notes: