Attack objects are stateful signatures and protocol anomalies that a security device

uses to detect attacks aimed at compromising one or more hosts on a network.