Views:
Category
Description
Access Control
Vulnerabilities caused by insecure access control
Backdoor/Trojan Horse
Network activities related to backdoor activity or Trojan horse
BotNet
BotNet activity
Buffer Overflow
Vulnerabilities caused by buffer (heap/stack) overflow/underflow
DoS (Denial of Service)
Denial of Services activities
Exploits
Exploits found in the public domain, such as Exploit-DB
File Vulnerabilities
Vulnerabilities regarding file formats, such as Office documents and image files
Instant Messenger
Instant Messenger activity
Malware Traffic
Activities incurred by malware, such as phone home to C&C servers
P2P
P2P activity
Reconnaissance
Scanning activities in the pre-compromise stage of an attack
Scan
Probe or scan activity
Virus/Worm
Network activities related to worms
Web Attack
Vulnerabilities regarding Web servers and clients
Miscellaneous
Anything that does not fit into any other category