Category |
Description |
|---|---|
Access Control |
Vulnerabilities caused by insecure access control |
Backdoor/Trojan Horse |
Network activities related to backdoor activity or Trojan horse |
|
BotNet |
BotNet activity |
Buffer Overflow |
Vulnerabilities caused by buffer (heap/stack) overflow/underflow |
DoS (Denial of Service) |
Denial of Services activities |
|
Exploits |
Exploits found in the public domain, such as Exploit-DB |
|
File Vulnerabilities |
Vulnerabilities regarding file formats, such as Office documents and image files |
|
Instant Messenger |
Instant Messenger activity |
|
Malware Traffic |
Activities incurred by malware, such as phone home to C&C servers |
|
P2P |
P2P activity |
|
Reconnaissance |
Scanning activities in the pre-compromise stage of an attack |
Scan |
Probe or scan activity |
Virus/Worm |
Network activities related to worms |
|
Web Attack |
Vulnerabilities regarding Web servers and clients |
|
Miscellaneous |
Anything that does not fit into any other category |
Views:
