What is the best way to harden an enterprise network against advanced evasion techniques (AETs)? I see vendors coming out with software that uses this same idea to prod a network's perimeter for holes. Furthermore, what's the best way to track down the source of AETs?
