First page
Back
Continue
Last page
Overview
Graphics
Hostile Fire
Activity consists of:
Scanning
Probing
Breaking into a host
Detection methods:
Look at TCP initial connections
Look at malicious UDP port activity
Look for scans
Notes: