Introduction - If you have any usage issues, please Google them yourself
The aim of this article is to explain how features of
attacks could be extracted from the packets. It also explains how
vectors could be built and then applied to the input of any analysis
stage