In my experience, the best strategy is to use the BGP protocol (Border Gateway Protocol) to divert the traffic that is detected as "anomalous" towards another route in which an "appliance" is used to clean it. The commercial tool that I recommend you study is "PeakFlow / TMS".
Predicting cyber attack preference of intruders is essential for security organizations to demystify attack intents and proactively handle oncoming cyber threats. In order to automatically analyze attack preferences of intruders, this paper proposes a novel framework, namely HinAp, to predict cyber attack preference using attributed heterogeneous attention network and transductive learning.
Jose Risomar Sousa please talk about what are the research work coming up in recent days. Our approach is to enrich the research community rather than talk against some groups. As we all know good and bad people exist in our world and they may hold any nationality.
I hope you understand. Best of wishes for your future remarks and contribution.
Jose Risomar Sousa you should suppose to give answer to the question that is asked in this thread and it is not the place to discuss free speech, if you like to give your views on this then just create a discussion forum here in ResearchGate or in any other place related to the topic that you are interested in but not where the topic is not mean for that. I hope you understand and respect people's views.