Anderson, a security engineer, was Instructed to monitor all incoming and outgoing traffic on the organization's network to identify any suspicious traffic. For this purpose, he employed an analysis technique using which he analyzed packet header fields such as IP options, IP protocols, IP fragmentation flags, offset, and identification to check whether any fields are altered in transit.
Identify the type of attack signature analysis performed by Anderson in the above scenario.
kanchantanwani
Highly Voted 11 months, 2 weeks ago044f354
Most Recent 4 months agoAhmed3yad
9 months agoAmesCB
9 months, 1 week agoAhmed3yad
9 months, 2 weeks ago