The evaluation of data packets stored in a database, or other storage device, allows for a historical evaluation of the attack and enables a reaction to the attack based on policy driven techniques, such as isolation of data packets, among other techniques.