Security needs (contd.)
Subscriber information
- Who’s subscribed
- Who’s checking a resource
- History of who’s checking a resource
Protect against denial-of-service attacks
- Transaction volume (flood attacks)
- Spurious hostnames
- Attacks against sub-components