Conclusions
A valuable technique for cyber-defense
Positive effect on detection significantly extended
Negative effect on attacks improved further
Valuable tool for intrusion detection and response
No significant impact on time or space
Now scalable to “The Whole Internet”