Companies and government agencies use a variety of technologies to protect their networks from unwanted intrusions. The attacks themselves are continuing to escalate in number and complexity,