: The device blocks or "floods" network packets, creating a temporary state of desynchronization between the client and the server.

: Used to deliver secondary malicious payloads.

: Tagged for suspicious behaviors like xworm or RAT (Remote Access Trojan) signatures. Identification and Reporting