Skip to main content

Table 11 ADFA-WD Vectors and Effects

From: Survey of intrusion detection systems: techniques, datasets and challenges

Vectors

­ TCP ports - Web-based vectors;

­ Browser attacks - Malware attachments.

Effects

­ Effects - Bind Shell - Reverse shell - Exploitation

­ Remote operation - Staging - System manipulation

­ Privilege escalation - Data exfiltration -Back-door insertion