The very nature of different possible attacks on or using network infrastructure requires various means of protection. Some of these protection tools can be used more generally to prevent misuse of computer systems (e.g. authentication), others are rather specific to networks (like traffic padding) [PFL97, p.405].