A.Application Protection B.Infrastructure Protection C.Performance Protection
A.Misuse and Abuse B.Port Scan/Host Sweep C.Traffic Normalization D.Traffic Thresholds