Network Intrusion Detection of Third Party Effects

Data from over 200 Pen Tests Shows Most Common Vulnerabilities. Learn more now.

The main goal of this paper is to familiarize the reader with reactions and responses from innocent victims, who may be subject to reconnaissance or denial of service. If a perpetrator spoofs your address space you may see unsolicited traffic from an innocent second party.

Download the paper in PDF format here.