When classifying observations as Unsolicited Communications events, we look for unwanted connection attempts to the system. These are captured by the hardware of software-based systems, such as firewalls.
Examples
- Communication attempts include secure shell (SSH) brute-force attempts, port probes, and network ports scanning.
- A device sends unsolicited communication if it is infected with a worm that is attempting to locate new devices to infect.
Publication Date – January 14, 2020
Feedback
0 comments
Please sign in to leave a comment.