Forum Discussion
Enr1g_219148
Sep 20, 2015Nimbostratus
Found a solution: "Security ›› Application Security : Attack Signatures : Attack Signatures List" then choose Advanced filter and by analyzing overlap after adding new set you can assume about relations between sets.
Thanks to boneyard for the idea.