... on Advances in Signal Processing 13[21] K. Tan, K. Killourhy, and R. Maxion, “Undermining an anomaly-based intrusion detection system using commonexploits,” in Proceedings of the 5th International ... (INFOCOM ’06),pp. 1–12, Barcelona, Spain, April 2006.[34] K T. Chen, C Y. Huang, P. Huang, and C L. Lei, An empirical evaluation of TCP performance in online games,” in Proceedings of the International ... scan, theincrease is observable and distinct from the benign traffic.Then, we ran a FIN scan, which is demonstrated in Figure 8.Once again, the scanning entity presented itself in a steadyincrease....