Anderson, a security engineer, was Instructed to monitor all incoming and outgoing traffic on the organization's network to identify any suspicious traffic. For this purpose, he employed an analysis technique using which he analyzed packet header fields such as IP options, IP protocols, IP fragmentation flags, offset, and identification to check whether any fields are altered in transit.
Identify the type of attack signature analysis performed by Anderson in the above scenario.
kanchantanwani
Highly Voted 9 months ago044f354
Most Recent 1 month, 3 weeks agoAhmed3yad
6 months, 3 weeks agoAmesCB
6 months, 4 weeks agoAhmed3yad
7 months, 1 week ago