Communication traffic is processed by detecting an anomaly in the
communication traffic. A first blocking measure A is applied to the
anomalous traffic that stops the anomalous traffic. A second blocking
measure is determined such that application of a logical combination of
the first blocking measure A and the second blocking measure to the
anomalous traffic stops the anomalous traffic.