Attack objects are stateful signatures and protocol anomalies that a security device
uses to detect attacks aimed at compromising one or more hosts on a network.