Skip to main content

Table 11 ADFA-WD Vectors and Effects

From: Survey of intrusion detection systems: techniques, datasets and challenges

Vectors
­ TCP ports - Web-based vectors;
­ Browser attacks - Malware attachments.
Effects
­ Effects - Bind Shell - Reverse shell - Exploitation
­ Remote operation - Staging - System manipulation
­ Privilege escalation - Data exfiltration -Back-door insertion