Views:

Category

Description

Access Control

Vulnerabilities caused by insecure access control

Backdoor/Trojan Horse

Network activities related to backdoor activity or Trojan horse

BotNet

BotNet activity

Buffer Overflow

Vulnerabilities caused by buffer (heap/stack) overflow/underflow

DoS (Denial of Service)

Denial of Services activities

Exploits

Exploits found in the public domain, such as Exploit-DB

File Vulnerabilities

Vulnerabilities regarding file formats, such as Office documents and image files

Instant Messenger

Instant Messenger activity

Malware Traffic

Activities incurred by malware, such as phone home to C&C servers

P2P

P2P activity

Reconnaissance

Scanning activities in the pre-compromise stage of an attack

Scan

Probe or scan activity

Virus/Worm

Network activities related to worms

Web Attack

Vulnerabilities regarding Web servers and clients

Miscellaneous

Anything that does not fit into any other category