The techniques described in this paper are focused on a firewall protecting a large public network. There's no reason these tools cannot be used to protect small networks, e.g. a home network behins a Linux firewall connected to the Internet via DSL.
A discussion of this is forthcoming...