I. Introduction
Attacks on computer infrastructures remain a persistent problem on the internet. Resolving these attacks often benefit from the support and actions of parties other than the victim. Still, most organisations connected to the internet operate their network domain autonomously using their own policies, therefore they share little information with others, which also applies to the subject of security.