Rig respond to allow DTK to:
	store IP address based service refusal
		IP addresses using deceptions get files in DTK/IPs
		files contain histories sorted by IP
	analyze cross-service / cross class C / Class B / Class C  issues

Set up a language to specify the details for:

	add deny capability so that access to 3 deceptions from one
	machine denies all access (via wrappers) to the machine from
	that IP address (for a period of time) AND reports the IP
	address on dtk infocon requests for remote denial of access

	10 deceptions from a class C network -> cut off whole network
	and warn in infocons

	20 deceptions from a class B ...

	1 deception from any IP address -> 

Rig Generic and listen to:
	read status information and incorporate it
	refuse service on identified bad actor ports

Add pragmas as an option in the response file (e.g., set slowly after a certain condition, reset loopcount, etc.)
