Attack objects are stateful signatures and protocol anomalies that the security device uses to detect attacks aimed at compromising one or more hosts on a network.